NewzIntel.com

    • Checkout Page
    • Contact Us
    • Default Redirect Page
    • Frontpage
    • Home-2
    • Home-3
    • Lost Password
    • Member Login
    • Member LogOut
    • Member TOS Page
    • My Account
    • NewzIntel Alert Control-Panel
    • NewzIntel Latest Reports
    • Post Views Counter
    • Privacy Policy
    • Public Individual Page
    • Register
    • Subscription Plan
    • Thank You Page

Category: Machine Learning

  • MIL-OSI Security: Victim Specialists Support American Indian and Alaska Native Communities

    Source: US FBI

    How long have you worked with AI/AN populations?

    I’ve lived in the Aberdeen community since 2009, and I love it here. I’ve had the privilege of working with the AI/AN populations since I started victim services in 2011.

    In my work with the FBI, I cover the Lake Traverse and Standing Rock South Dakota side reservations. Our office puts in a lot of miles. The communities we cover are, on average, two to three hours away.

    What challenges do you face in working with AI/AN victims that you may not face elsewhere?

    The lack of resources is, by far, my biggest challenge. The reservations are very rural, so they don’t have the resources that you see in bigger towns. My car is stocked with toiletries, clothing, diapers, blankets, gloves, etc., that I can access when needed.

    On the reservations, there’s a lack of trauma-informed counseling options. With many of the cases I work, people have to travel anywhere from 30 minutes to two hours one way to see a counselor that specializes in trauma. This is not sustainable due to costs, limited transportation, and weather.

    Another big challenge is the lack of foster homes and shelters, as well as the ability to keep these placements confidential. This can create a barrier for victims who want to leave their situations but fear the perpetrators will be able to find them.

    What do you wish people knew about working as a VS in the FBI?

    Being a victim specialist can be the most challenging but, more importantly, the most rewarding job. I think some people have the notion that the AI/AN populations do not want our help, but that could not be farther from the truth, in my experience. Everyone I have met is so excited to see there is help, support, resources, and justice for the things that have been done to them. I’m reminded every day of how I am so blessed, and it helps me want to give more to provide hope that they can get through this.

    What’s the best part of being a VS?

    The best moment in my job is seeing a victim realize they are strong, courageous, and a survivor. This happens in many ways. For example, I worked with a young victim who initially said she couldn’t testify at trial with the defendant there. Not only did she do an amazing job at testifying, which helped the jury convict the defendant, but she stood and read her victim impact statement at the sentencing hearing. The hug I received after that hearing is something I will never forget.

    I also worked with a mom who had endured years of domestic violence and then found out her husband was abusing their daughter. Those were truly their darkest days, but the transformation I have seen in them is truly amazing. The daughter received a kindness award at school and has improved her grades and attendance. The mother has kept stable employment and secured a home for their family to continue to heal and grow.

    MIL Security OSI –

    May 27, 2025
  • MIL-OSI Europe: Press release – Parliament approves new tariffs on Russian and Belarussian agricultural goods

    Source: European Parliament

    MEPs backed increased tariffs on fertilisers and certain Russian and Belarusian agricultural goods on Thursday, seeking to reduce EU dependency on those imports.

    Plenary has endorsed the Commission proposal to increase by 50% EU tariffs on agricultural products from Russia and Belarus that were not yet subject to extra customs duties. The aim is to reduce EU dependence on the two countries still further. Products to be hit by the new tariffs include sugar, vinegar, flour and animal feed.

    The text also provides for a 6.5% tariff on fertilisers imported from Russia and Belarus, plus duties of between €40 and €45 per tonne for the 2025-2026 period. These tariffs will rise to €430 per tonne by 2028. Income from the sale of Russian and Belarussian fertilisers is considered to be contributing directly to the war against Ukraine.

    The proposed measures will reduce EU imports of the goods concerned significantly, whether they originate in the two countries or are exported directly or indirectly by them. It is expected that this will result in further diversification of EU fertiliser production, currently impacted by the low prices of imports.

    The legislation also tasks the Commission with monitoring price increases and any possible damage to the internal market or the EU agriculture sector, and with taking action to mitigate the impact.

    The regulation was adopted by 411 votes in favour and 100 against, with 78 abstentions.

    Quote

    The standing rapporteur for Russia Inese Vaidere (EPP, LV) said: “The regulation gradually increasing customs duties for products from Russia and Belarus will help to prevent Russia from using the EU market to finance its war machine. It is not acceptable that three years after Russia launched its full-scale war, the EU is still buying critical products in large volumes, in fact, these imports have risen significantly.

    The proposal will boost EU fertiliser production, which has taken a hit from cheap Russian imports, while giving farmers time to adjust.

    Importantly, the proposal also includes monitoring provisions enabling the Commission to follow the fertiliser market closely and take action if prices shoot up.”

    Next steps

    With approval in plenary, Parliament closed its first reading. The regulation must now be adopted formally by the Council and subsequently published in the Official Journal, before it can enter into force. For the remaining agricultural products (listed in Annex I of the proposal), the regulation will apply four weeks after the bill’s entry into force.

    Background

    Imports into the EU of urea and nitrogen-based fertilisers from Russia, already high in 2023, rose significantly in 2024. According to the Commission, imports of the fertilisers covered by this regulation reflect a situation of economic dependence on Russia. If left unchecked, the situation could harm EU food security and, in the case of fertilisers in particular, leave the Union vulnerable to possible coercive measures by Russia.

    It was to address these issues that the Commission presented its proposal to impose tariffs on fertilisers and certain agricultural products originating in Russia and Belarus, on 28 January 2025.

    MIL OSI Europe News –

    May 27, 2025
  • MIL-OSI Canada: G7 Finance Ministers and Central Bank Governors’ Communiqué

    Source: Government of Canada News

    Statement

    We began by reiterating our shared commitment to the G7. After 50 years of working together, transcending national differences and promoting global prosperity, the value of the G7 is clear.

    Banff, May 20-22, 2025

    1. We, the G7 Finance Ministers and Central Bank Governors, met on May 20-22, 2025 in Banff, Canada together with the Heads of the International Monetary Fund (IMF), World Bank Group (WBG), Organisation for Economic Cooperation and Development (OECD), and Financial Stability Board (FSB). We were also joined by Ukrainian Finance Minister Sergii Marchenko and the President of the Financial Action Task Force (FATF) for parts of the meeting.
    2. We began by reiterating our shared commitment to the G7. After 50 years of working together, transcending national differences and promoting global prosperity, the value of the G7 is clear. We held a productive and frank exchange of views on the current global economic and financial situation, the risks and opportunities common to our countries, and ways to address them. This joint statement reflects the outcome of the discussion between G7 Finance Ministers and Central Bank Governors during the meeting.  

    Global Economy

    1. In the face of multiple complex global challenges, we are committed to pursuing our shared policy objectives. We agree that the G7 can leverage our strong economic relationships to advance our common goals. International organizations signaled at our last meeting that trade and economic policy uncertainty was high and weighing on global growth. We acknowledge that economic policy uncertainty has declined from its peak, and we will work together to achieve further progress. We also shared our concerns over unsustainable global macro imbalances.
    2. In this respect, we also underscore the need to address excessive imbalances and strengthen macro fundamentals, given potential global spillovers. We call on the IMF to continue to enhance its analysis of imbalances in both its bilateral and multilateral surveillance. We continue to engage with each other and with international partners to advance international cooperation and deliver prosperity.
    3. Strong and sustainable economic growth is the cornerstone of economic prosperity. We are committed to working together to achieve a balanced and growth-oriented macroeconomic policy mix that supports our economic security and resilience and ensures that all of our citizens can benefit from that growth. We are committed to maintaining well-functioning financial markets. We recognize that elevated uncertainty can have implications for the economy and for financial stability. We will continue to monitor and consult closely on these matters. Our central banks remain strongly committed to ensuring price stability, consistent with their respective mandates. We reaffirm our May 2017 exchange rate commitments.

    Economic Resilience and Security

    1. We recognize the need for a common understanding of how non-market policies and practices (NMPPs) aggravate imbalances, contribute to overcapacity, and impact the economic security of other countries. Building on our previous commitments and as guided by Leaders, we will contribute, as appropriate, to the monitoring of NMPPs, continuing to assess the distortions they cause in markets and their global spillovers. We agree on the importance of a level playing field and taking a broadly coordinated approach to address the harm caused by those who do not abide by the same rules and lack transparency.
    2. We call on international organizations to address data gaps and deepen our collective understanding of NMPPs and their domestic and global implications. We agree that joint analysis of market concentration and international supply chain resilience would be useful areas of future work. This analysis will inform our respective policy approaches, which will in part be shaped by our underlying industrial and consumer structures. Where appropriate and relevant, we will engage partners beyond the G7.
    3. We recognize a significant increase in international low-value shipments being sent to our economies in a decentralized manner, and the potential for this to overwhelm and take advantage of customs controls and duty and tax collection infrastructure. Collectively, we recognize the potential for illicit drug trafficking, the importation of counterfeit goods, the misclassification of merchandise, revenue leakage, inequity for our retailers, and significant environmental waste. We commit to exploring ways that our low-value importation systems could address these risks.

    Support for Ukraine

    1. We condemn Russia’s continued brutal war against Ukraine and commend the immense resilience from the Ukrainian people and economy. Ukraine has suffered significant destruction. The G7 remains committed to unwavering support for Ukraine in defending its territorial integrity and right to exist, and its freedom, sovereignty and independence toward a just and durable peace.
    2. We welcome ongoing efforts to achieve a ceasefire. If such a ceasefire is not agreed, we will continue to explore all possible options, including options to maximize pressure such as further ramping up sanctions. We reaffirm that, consistent with our respective legal systems, Russia’s sovereign assets in our jurisdictions will remain immobilized until Russia ends its aggression and pays for the damage it has caused to Ukraine.
    3. We agree that private sector mobilization will be important in the recovery and reconstruction of Ukraine, with costs estimated by the WBG at US$524 billion over the next decade. We collectively commit to help build investor confidence through bilateral and multilateral initiatives. To this end, in addition to the ongoing support through the MIGA SURE (Support for Ukraine’s Reconstruction and Economy) trust fund, we will work, including through the Ukraine Donor Platform, with the Government of Ukraine, international financial institutions (IFIs), and the insurance industry towards removing the blanket ban imposed on Ukraine as soon as possible. We will continue to coordinate support to promote the early recovery and reconstruction of Ukraine, including at the Ukraine Recovery Conference, which will take place in Rome on July 10-11, 2025. Further, we agree to work together with Ukraine to ensure that no countries or entities, or entities from those countries that financed or supplied the Russian war machine will be eligible to profit from Ukraine’s reconstruction.

    Bolstering Long-term Growth and Productivity

    1. We agree on the importance of pursuing public policies that spur innovation, raise productivity and promote greater labour force participation. In an environment of high public debt and increasing fiscal pressures, we also agree that raising long-term growth potential is essential to manage risks to fiscal sustainability and increase wages and living standards.
    2. We discussed and shared experiences on how best to pursue growth-enhancing policies in a fiscally prudent manner. We agree that structural reforms can help set the foundations for strong and sustainable economic growth. We recognize that specific growth policies need to be adapted to each country’s needs and circumstances. We agree that maintaining a stable and predictable macroeconomic environment is important for strong growth and productive long-term investment.

    Artificial Intelligence

    1. We deepened our understanding of prospects for AI to raise productivity growth, and of the policies needed to realize the benefits. We appreciate the framework provided by the OECD to better quantify and monitor AI-driven productivity gains. We recognized the benefits of AI for the financial sector and the need to monitor and assess potential risks to financial stability as AI adoption further increases.

    Financial Sector Issues

    1. We are committed to a strong, resilient and stable financial sector. We reiterate that a continued focus on financial stability and regulatory issues remains vital to ensure the effective functioning of the financial system. We noted our support for the important work of the FSB and Standard Setting Bodies. We focused on non-bank financial intermediaries, which play an increasingly important role in financing the real economy. Their activities can contribute to the efficiency of financial markets but can also pose risks to the global financial system. We discussed sources of potential risk, including those from liquidity mismatch, leverage and interconnectedness. We agree on the need to assess non-bank data availability, use and quality and to share knowledge and approaches to monitoring and assessing potential risks.
    2. Enhancing cross-border payments can have widespread benefits for citizens and economies worldwide. We remain committed to delivering cheaper, faster, more transparent and more accessible cross-border payments while maintaining their safety, resilience, and financial integrity. This includes supporting the implementation of the G20 Roadmap as well as appropriate future actions as necessary to meet these goals.
    3. Cyber risks threaten to disrupt global financial systems and the institutions that support them. To address the evolving cyber threat landscape, we will continue to take action to further strengthen our shared response capabilities and protocols in the event of a significant cyber incident. We look forward to the G7 Cyber Expert Group’s assessment of the risks and opportunities that AI presents for cybersecurity.
    4. The potential effects of quantum technologies on the global financial landscape are becoming increasingly visible. Our central banks will explore how we can identify, categorize and mitigate potential risks to data security and financial stability and promote economic resilience.

    Financial Crime Call to Action

    1. We remain steadfast in our commitment to tackling financial crime, including money laundering, terrorist financing and the financing of proliferation of weapons of mass destruction (AML/CFT/CPF). We endorse a “Financial Crime Call to Action” to spur further progress and collective efforts of the Financial Action Task Force (FATF) and its Global Network. By bringing together over 200 jurisdictions around the world, the FATF is the ultimate international standard setter, and we welcome its leadership in combatting financial crime since its creation by the G7 in 1989.
    2. Through strengthening our AML/CFT/CPF frameworks and enhanced international cooperation we will endeavor to stay abreast of emerging risks, understand the role of technology and deepen the responsible exchange of information to make it harder for criminals to access the financial system and evade detection.
    3. We recognize financial crime acts as a barrier to growth, development and stability, and support efforts to strengthen frameworks in lower capacity countries. We encourage the international community to join us in this Call to Action and strengthen our collective response to financial crime.

    Support for Developing Countries

    1. We reaffirm our commitment to the ongoing implementation of the World Bank-led Resilient and Inclusive Supply-Chain Enhancement (RISE) Partnership and recognize its progress toward better integrating low- and middle-income countries in the global supply chain of clean energy products, especially in Africa. We welcome the adoption of a country roadmap in Zambia. We encourage the World Bank to further advance this initiative, and we look forward to the launch of the first local and regional information platforms in Africa. We support the expansion of RISE’s activities to Latin America and the Caribbean, and a better integration of all segments of the critical mineral supply chain. We call on Multilateral Development Banks (MDBs) to strengthen collaboration on critical mineral supply chains amongst themselves and with other key stakeholders. We also highlighted linkages to G20 initiatives facilitating private sector development, such as the G20 Compact with Africa.
    2. We recognize that global crises, including health crises and natural disasters, pose significant challenges for all economies, with particularly severe impacts on vulnerable states, including small ones. We reaffirm the importance of strengthening support for these countries by facilitating domestic resource mobilization as well as the use and uptake of crisis preparedness and response tools, including Climate Resilient Debt Clauses and insurance, to help ease fiscal pressures. We encourage the IMF and MDBs to strengthen their focus on crisis prevention in order to reduce the incidence of crises materializing.
    3. We call on the international community to make efforts to support vulnerable countries facing debt challenges. We look forward to the G20 work on improving the implementation of the Common Framework for debt treatments in a predictable, timely, orderly, and coordinated manner. We also agree on the importance of advancing debt transparency to support sound economic governance and financial stability. We call on the international community to make efforts to support vulnerable countries whose debt is sustainable but face near-term liquidity challenges. We recognize the need for continued efforts with all partners, public and private, to enhance the availability and quality of debt data, including through the Data Sharing Exercise with the World Bank.
    4. We reaffirm our commitment to achieving more effective and impactful MDBs through reforms aiming to ensure that they work effectively as a system to address the most pressing global challenges, deliver on their core mandate, and use their resources as efficiently as possible, including by implementing the recommendations from the G20 Capital Adequacy Framework Review. We urge MDBs to continue to step up their efforts to mobilize private capital and enhance domestic resource mobilization in emerging markets and developing countries. We emphasize the importance of implementing quality-based procurement policies and procedures that promote efficiency, competition from the private sector, and transparency.

    G7 Financial Crime Call to Action

    The G7 Finance Ministers and Central Bank Governors remain steadfast in our commitment to tackling financial crime, including money laundering, terrorist financing and the financing of proliferation of weapons of mass destruction (AML/CFT/CPF).

    In 1989, the G7 created the Financial Action Task Force (FATF) to “prevent the utilization of the banking system and financial institutions for the purpose of money laundering” and was soon joined by many other countries and jurisdictions which shared the same concerns and volunteered for a global effort against financial crime. Since its establishment, the FATF’s mandate and standards have expanded to include the combatting of financing of terrorism and the financing of proliferation of weapons of mass destruction. The transnational nature of money laundering, malicious nature of its predicate crimes, and integrated nature of our economies necessitate a collective approach to combatting illicit finance. 2025 marks the 35-year anniversary of the FATF’s “40 Recommendations”, which were developed collectively by FATF members and are now being implemented in more than 200 jurisdictions worldwide thanks to the joint efforts of the FATF Global Network.

    The Intersection of Crime, Security, and Economic Prosperity

    Organized criminals, including cartels, are exploiting gaps in global AML safeguards to launder the profits of their criminal activities such as drug trafficking (including fentanyl and synthetic opioids), fraud, cybercrimes, and human smuggling that generate billions in illicit revenue annually. These crimes are not only having a devastating impact on our communities, but they are also impacting national security and economic integrity as profits are re-invested into vast criminal networks that seek to undermine the rule of law and destabilize our governments and economies.

    Financial crime is also harming global economic growth. The International Monetary Fund has found that illicit finance reduces productivity, widens inequality, inhibits legitimate investment and hinders an effective allocation of resources. The World Bank has found that financial crimes are a barrier to development sparking political instability, deterring private capital, undermining good governance and the rule of law, and generally eroding trust in governments and institutions. Illicit finance also robs treasuries of badly needed tax revenue at a time when so many economies around the world are facing historically high debt levels.

    The World Bank sees tackling illicit finance in low-capacity countries as vital to their development priorities and requiring sustained engagement. Strengthening AML/CFT/CPF capacity in developing and low-capacity countries would improve financial inclusion and further deprive international organized crime groups of opportunities to launder their illicit proceeds or finance terrorism.

    In this context, technically sound and effective AML/CFT/CPF frameworks contribute to safer communities, our collective security, and to stronger economies in the G7 and around the globe.  

    The Way Forward

    Under the Canadian G7 Presidency, Finance Ministers and Central Bank Governors have taken stock of the fight we launched in 1989 and identified areas for further action. Today, we endorse the present Financial Crime Call to Action to strengthen global security, protect financial sector integrity, and foster economic growth and economic development.

    Strengthening our Frameworks

    • We re-commit to the founding principles of the FATF and will continue to actively support the organization.
      • The FATF is the ultimate AML/CFT/CPF standard setter that catalyzes improvements in members’ AML/CFT/CPF regimes. It is essential to maintain the FATF’s role at the centre of the global fight against illicit finance.
      • We commit to ensuring that the FATF remains a technical body that produces in-depth and impartial peer reviews and research that inform our ongoing understanding of risk.
    • We commit to improving the effectiveness of our respective AML/CFT/CPF regimes. The G7 must lead by example.
      • G7 financial systems remain the most interconnected in the world and continue to represent attractive targets for bad actors seeking to launder ill-gotten gains. The G7 will continue to improve our effectiveness in preventing the proceeds of crime from entering our financial sectors, detecting and disrupting money laundering threats, sanctioning criminals and depriving them of their illegitimate proceeds in a manner consistent with our domestic legal frameworks.
      • Shell companies are enablers for criminals to hide proceeds of crime and engage in illicit activities, such as large-scale tax and sanctions evasion. Ensuring that competent authorities, particularly law enforcement, have sufficient resources and tools to investigate and prosecute money laundering, terrorist financing, and proliferation financing involving shell companies is critical to fighting financial crime.
      • The procurement of dual use and military technology through circumvention of sanctions violates United Nations Security Council Resolutions and undermines global security. We commit to enhancing implementation of our targeted financial sanctions and ensuring they are the most effective in the world.

    Enhancing International Cooperation

    • We will stay abreast of emerging risks tied to money laundering, terrorist financing and proliferation financing through research and the development of joint typologies and strategic intelligence.
      • We express our serious concerns that virtual asset thefts and scams, including by the Democratic People’s Republic of Korea, have reached unprecedented levels. These threats, as well as the methods used by criminals to launder their proceeds, must be better understood and addressed. This is necessary to raise awareness, enhance prevention, and mitigate money laundering as well as being critical to promoting responsible innovation in virtual assets and protecting virtual asset users in our jurisdictions. We will further research and exchange information such as typology work on emerging risks related to virtual assets, including from the perspectives of cybersecurity and AML/CFT/CPF, and take necessary measures.
      • We recognize that illicit actors will continue to take advantage of jurisdictional differences in approaches to countering sanctions evasion and the financing of proliferation. Therefore, we commit to work together to maintain an up-to-date and common understanding of relevant threats, vulnerabilities, and typologies to prevent and combat complex proliferation financing and sanctions evasion schemes.
    • We must break down silos and deepen the responsible exchange of information internationally to make it harder for criminals to access the financial system and evade detection.
      • Bad actors are exploiting silos within, and across, AML/CFT/CPF regimes to conceal their actions. In response, we will improve risk-based and secure information sharing internationally between our national competent authorities, and domestically amongst the private sector and between public and private sector partners, consistent with our domestic legal frameworks. Facilitating this type of information sharing supports G7 efforts to mitigate the negative impacts of fraud on our businesses and citizens and to combat illicit activities by transnational organized crime groups, including cartels.
      • Many of our financial institutions operate across G7 markets. We will encourage deeper cooperation between our regulators who supervise on a group-wide basis. We commit to ensuring that our AML/CFT/CPF supervision is risk-based, effective and focused on stopping financial crime. We will also ensure that sanctions for non-compliance are proportionate, dissuasive and effective.

    Addressing Financial Crime as a Barrier to Growth and Stability

    • We will support efforts to strengthen AML/CFT/CPF frameworks in lower capacity countries to foster growth and economic development.
      • This can be achieved through many channels, including bilateral and multilateral assistance and collaboration. This work will ensure the G7 together with other FATF members keep pace with evolving regional risks, and support asset recovery to further deprive criminals of illicit proceeds and reduce opportunities for money laundering.
      • The FATF and its Global Network of nine FATF-Style Regional Bodies (FSRBs), which bring together more than 200 jurisdictions and 20 observer international organizations, are at the heart of the global fight against financial crime. We reiterate our commitment to supporting the FSRBs in overseeing the consistent and effective implementation of the FATF standards worldwide, including in the next round of mutual evaluations.
    • We commit to supporting the effective implementation of AML/CFT/CPF measures that are risk-based and proportionate.
      • We recognize that a risk-based approach can promote economic development and financial inclusion by encouraging assessments of risk, identifying lower and higher risk scenarios, and implementing simplified AML/CFT/CPF measures in certain scenarios proportionate to the relevant risks. 
      • By implementing the revised FATF standards, we will facilitate legitimate funds continuing to move through the formal financial sector, promoting economic development and financial inclusion while mitigating unintended consequences.
    • We commit to exploring the role of technology in AML/CFT/CPF implementation.
      • We encourage adoption of new technologies that can more effectively detect, report and interdict illicit finance. This includes partnering with the private sector to understand how emerging technologies (including artificial intelligence) can be used to improve the efficiency and effectiveness of AML/CFT/CPF regimes. This should be consistent with our respective domestic legal frameworks and risk-based, while ensuring data protection and human rights.
      • We continue to support the FATF’s initiatives to accelerate global implementation of its standards on virtual assets and virtual asset service providers (VASPs) as well as its work on emerging risks, including those that arise from misuse of stablecoins and peer-to-peer transactions, offshore VASPs, and decentralized finance (DeFi) arrangements.
      • We are contributing to the FATF’s ongoing work to strengthen its Standards on Payment Transparency to adapt to changes in payment business models and messaging standards and to foster payment systems that are more transparent, inclusive, accessible, safe and secure, while enabling faster and cheaper transactions, including remittances. Consistent with this work, we also support the G20 Roadmap for Enhancing Cross-border Payments.

    Lastly, we commit to furthering this work under the French G7 Presidency in 2026, in coordination with all FATF members, and to report on the actions taken to implement the commitments in this Call to Action.

    We encourage all countries to join us in this Call to Action. The international community can, and must, strengthen our collective response to financial crime and its impact on communities, security, and prosperity.

    MIL OSI Canada News –

    May 27, 2025
  • MIL-OSI: Matador Technologies Inc. Announces Additional Non-Brokered Private Placement

    Source: GlobeNewswire (MIL-OSI)

    TORONTO, May 22, 2025 (GLOBE NEWSWIRE) — Matador Technologies Inc. (“Matador” or the “Company”) (TSXV: MATA, OTCQB: MATAF), a Bitcoin-focused company, is pleased to announce a non-brokered private placement offering of up to 6,451,613 units (the “Units”) at a price of $0.62 per Unit, for aggregate gross proceeds of up to C$4,000,000 (the “Offering”), with an option to increase the Offering by up to 15% (the “Over-Allotment Option”).

    Each Unit will consist of one common share and one-half of one common share purchase warrant (each whole warrant, a “Warrant”). Each Warrant will entitle the holder to acquire one additional common share of the Company at a price of $0.77 for a period of twelve (12) months from the date of issuance.

    The Warrants will be subject to an acceleration clause: in the event that the closing price of the Company’s common shares on the TSX Venture Exchange (the “TSXV”) is equal to or exceeds $1.15 for five (5) consecutive trading days at any time following the date which is four months and one day after the closing date, the Company may accelerate the expiry date of the Warrants to the date that is thirty (30) days following the dissemination of a press release announcing such acceleration.

    The securities issued in connection with the Offering will be subject to a statutory hold period of four months and one day from the date of issuance, in accordance with applicable Canadian securities laws.

    The Offering is being conducted pursuant to available exemptions from prospectus requirements and will be made to “accredited investors” in all provinces of Canada and in such other jurisdictions as the Company may determine, in accordance with applicable securities laws.

    The net proceeds of the Offering are expected to be allocated approximately one-third to each of the following: (i) the purchase of Bitcoin; (ii) advancing the Company’s gold acquisition and Grammies business initiatives; and (iii) general corporate purposes.

    The Offering is subject to customary closing conditions, including the receipt of all necessary regulatory approvals, including that of the TSX Venture Exchange.

    For additional information, please contact:

    Media Contact:
    Sunny Ray
    President
    Email: sunny@matador.network
    Phone: 647-932-2668

    About Matador Technologies Inc.
    Matador Technologies Inc. is a publicly traded Bitcoin ecosystem company that holds Bitcoin as its primary treasury asset and builds products to enhance the Bitcoin network. Through a self-reinforcing model that combines strategic Bitcoin accumulation, Bitcoin-native product development, and participation in digital asset infrastructure, Matador aims to grow long-term shareholder value without dilution.

    The Company’s flagship offering, the Digital Gold Platform, allows users to buy, sell, and trade 1-gram gold units inscribed as Bitcoin Ordinals—bridging traditional value with decentralized technology. With a Bitcoin-first strategy, a debt-free balance sheet, and a clear focus on innovation, Matador is helping shape the future of financial infrastructure on Bitcoin.

    Learn more at www.matador.network.

    Cautionary Statement Regarding Forward-Looking Information

    NEITHER THE TSX VENTURE EXCHANGE NOR ITS REGULATION SERVICES PROVIDER (AS THAT TERM IS DEFINED IN THE POLICIES OF THE TSX VENTURE EXCHANGE) ACCEPTS RESPONSIBILITY FOR THE ADEQUACY OR ACCURACY OF THIS RELEASE.

    This news release does not constitute an offer to sell or the solicitation of an offer to buy any securities in any jurisdiction.

    Forward-Looking Statements – Certain information set forth in this news release may contain forward-looking statements that involve substantial known and unknown risks and uncertainties, including risks associated with the implementation of the Company’s treasury management strategy and the launch of its mobile application as currently proposed or at all. These forward-looking statements are subject to numerous risks and uncertainties, certain of which are beyond the control of the Company, including with respect to the potential acquisition of Bitcoin and/or US dollars, the pricing of such acquisitions and the timing of future operations. Readers are cautioned that the assumptions used in the preparation of such information, although considered reasonable at the time of preparation, may prove to be imprecise and, as such, undue reliance should not be placed on forward-looking statements.

    The MIL Network –

    May 27, 2025
  • MIL-OSI USA: Murkowski Highlights Opportunities, Challenges with Interior Budget Request

    US Senate News:

    Source: United States Senator for Alaska Lisa Murkowski
    05.22.25
    Washington, DC – Yesterday, U.S. Senator Lisa Murkowski (R-AK), Chair of the Senate Appropriations Subcommittee on Interior, Environment, and Related Agencies, hosted the Secretary of the Interior in subcommittee to discuss the Department’s budget request. The Senator reinforced her appreciation for the administration’s approach to resource development in Alaska, while also addressing staffing concerns, public land sales, and other avenues of potential for the department.
    Watch the Senator’s opening statement here.
    Read the Senator’s full opening statement below.
    FULL TRANSCRIPT
    Senator Murkowski: Good to have you here to discuss the President’s Fiscal Year 2026 Budget Request for the Department of the Interior. I’m pleased to have the opportunity today to talk about the important work that the Department does, including its leading role in supporting America’s energy agenda, empowering Indian country and Tribal nations, providing recreational opportunities to tens of millions of Americans, and generating billions of dollars in economic output.
    It’s been a real pleasure, I have appreciated the meetings that we’ve had, the conversations that we’ve had by phone, and it’s been great to meet the various Assistant Secretary nominees from the Department. I’ve enjoyed our conversations there. I’m impressed by their understanding of the issues that they focus on, and their commitment to public service.
    You’re building out quite the team. It was great to be able to talk to Kate MacGregor. She has a little bit of history with the Department, and comes with a lot of knowledge and understanding, certainly on Alaska–related issues, so we were glad to get her confirmed and to work as well as some of the other nominees. As the Chairman of the Indian Affairs Committee, we’re anxious to have a nominee for the [Assistant Secretary for Indian Affairs] as well.
    So, I want to thank you, I want to thank President Trump for recognizing Alaska’s amazing natural resource potential. This was very significant in the day-one executive order: everything from the Ambler Road to the NPR-A, to non-wilderness Coastal Plain, Alaska
    LNG. There’s been very swift, very early, and decisive action in this space. It’s welcome both here in Washington, DC, and certainly in my state. So, I’m looking forward to working with you to further facilitate the development of Alaska’s resources.
    I know you are looking forward to going to Alaska in just a couple weeks. Hopefully, it’s going to be a great trip, lots of good information, good feedback, and good weather. I’m hopeful that Denali will be out in all of its majesty and splendor and you’ll be reminded why Alaskans prefer the Koyukon-Athabascan name, “Denali,” meaning ‘the Great One.’
    The President and you have set out an ambitious agenda, particularly with respect to the focus on energy and economic development. I’m very supportive of this endeavor, and know that I want to be your partner in achieving so many of the goals.
    Beyond resource development, the Department of the Interior can be an economic force for good in many different ways. One of the most important economic drivers that we see up in Alaska, aside from the resource end of things, within the Department is the National Parks System. The National Parks in the home states of the members on this subcommittee generate a collective $7.4 billion of economic output annually. That’s more than the gross domestic product of 40 different countries. But it’s not just the economic output that makes parks so important, it’s the experiences of traveling to parks, seeing the wildlife, having an adventure that creates a lifetime of memories. And, we’ve had discussions about some of your early years and the significance of that.
    Back home in Alaska, we’ve already had about 150,000 people come through on cruise ships this year. That might not surprise other people, but this is early for us. We estimate a total of 1.65 million visitors for the tourism season – that’s about double the population of our state. So, when we see a skinny budget that proposes to cut $1.2 billion or 35% from the Park Service, it’s hard to square it with the claims that DOI is focused on fostering the American economy, again recognizing that our economy is more than just our natural resource development.
    Another area of concern that I will address in my questions within the National Park Service budget proposal is the concept of turning over management of National Parks to the states. I’m trying to figure out exactly how this would work, and I’m kind of thinking it’s like me putting my kids in charge of the upkeep for the house that I own. In some instances, it might make good sense, but as a wholesale best practice I worry about how that might impact the parks or our people. So, should this concept be included in the full budget request, I’d hope that we have a really thorough conversation with you to better understand the justification for the proposal.
    I am concerned about what the skinny budget proposes for the BIA and the BIE. Cutting nearly $1 billion from Indian Affairs would hurt the federal government’s ability to meet its trust responsibility to Native people. In some of our conversations, I’ve shared some of the areas where I think the Department has failed Indian Country, and this is in areas like probate, where we have an extraordinary backlog, public safety and justice, missing and murdered indigenous people, as well as the education of Native American children.
    While I appreciate that the skinny budget alleges that proposed cuts would enable Tribes to focus on law enforcement, I’m not sure how reducing BIA law enforcement funding by $107 million is treating the program as a core priority of Tribes. I know, because I hear Tribes have been requesting more support for this program to address a serious lack of policing, so I worry that cuts of this magnitude can’t be made up for by directing Tribes to apply for grants at DOJ as the skinny budget suggests.
    I want to end my opening comments this morning by talking about what I consider to be, and I know that you put equal priority to, and that’s the men and women of the Department. The people who actually make things happen.
    We’ve talked about a lot of good ideas for using new systems, IT systems, artificial intelligence, how we can make the Department more efficient. These are good goals, worthy goals, and I hope to see that detailed more in the budget. But I think we know when we’re talking about management of our public lands, if you don’t have the necessary staff, whether out in the field or in the headquarters, all the investments that we want to make become less efficient.
    When I think about the Executive Order as it relates specifically to Alaska, we’ve got some good things that we want to do up north when it comes to resource development, but scientific and ecological assessments that are provided by USGS are relied upon by not just federal land management agencies, but by the industry as well. USGS science helps avoid polar bear dens, identify permafrost, map caribou migration patterns. So, when we see cuts to USGS, but also BLM, BOEM, BSSE, and OSMRE, it causes me to wonder, are we going to be able to accomplish what we’re all seeking to accomplish together?
    I think it’s important also that people have expertise and knowledge about the places that they serve. I had this conversation with folks in the Forest Service. You just can’t take somebody who maybe comes from Indianapolis, a good Forest Service person, but you put them out at the Mendenhall Glacier Visitors Center where their job is bear management and they don’t have a clue about bear management.
    We want to make sure that we’re making good and smart decisions. I know you’re probably going to get a lot of questions today about staffing cuts, and how that is going to impact the operations of the Department not just here in Washington, but around the country. I do wish that the Acting Assistant Secretary for Policy, Management, and Budget, Mr. Hassan, [was] here today to answer some of these questions because he seems to be in charge of making a lot of the decisions about the staffing and the [reorganization]. I’m hoping that he is going to be in a position to be more responsive to my staff about some of the questions that we have raised. But ultimately, and you know, you’ve been a governor you know the buck stops with you. He can be responsible for certain things, but ultimately it is you that is accountable.
    So, getting the answers to questions about the reorganizations, the impacts of RIFs, how the Department will operate National Parks, protect reserves, and implement the President’s energy agenda. Getting this channel of communication going back and forth in a good and a constructive way, I think is going to be important. But, my bottom line to you this morning is [that] I’m I pleased with your nomination, I’m excited that you are there at the Department.
    I’m really excited about the shift that we’re seeing in Alaska where the Department has really gone from being a problem to being a partner in so many different areas. So, [I’m] looking forward to what we’re going to be able to do together.

    MIL OSI USA News –

    May 27, 2025
  • MIL-OSI United Nations: Experts of the Committee on the Rights of the Child Praise Qatar’s Investments in Child Health and Education, Ask about the Age of Criminal Responsibility and Penalties for Child Offenders

    Source: United Nations – Geneva

    The Committee on the Rights of the Child today concluded its consideration of the fifth and sixth combined periodic reports of Qatar under the Convention on the Rights of the Child, with Committee Experts praising the State’s investments in child health and education, and raising questions about its efforts to raise the minimum age of criminal responsibility and prohibit the imposition of harsh penalties, including the death penalty and flagellation, on child offenders aged 16 years and over.

    Aissatou Alassane Sidikou, Committee Expert and Taskforce Coordinator for Qatar, commended Qatar’s efforts to invest in children’s health and education; implement its national development programme, which promoted sustainable development; establish its Ministry of Social Development and Family; and implement the Committee’s recommendations.

    Ms. Sidikou asked whether Qatar’s draft bill on children’s rights would increase the minimum age of criminal responsibility of children, which was currently one of the lowest in the world at seven years, and prohibit imprisonment, flagellation and forced labour for children, which was currently allowed from 16 years of age.  In Qatar, children could be sentenced to death. What measures were in place to strictly prohibit the application of the death penalty on children?

    Rosaria Correa, Committee Expert and Country Taskforce Member, said that despite the recommendations of various human rights mechanisms, the new nationality law did not allow Qatari women married to foreign citizens to pass on their nationality to their children. What steps had been taken to amend this law and other laws to allow Qatari women to pass on their nationality to their children?

    Introducing the report, Ahmad bin Hassan Al-Hammadi, Secretary-General of the Ministry of Foreign Affairs of Qatar and head of the delegation, said that, over the reporting period, Qatar had worked to strengthen legislative and institutional measures to protect children’s rights in the fields of education, health, social protection and criminal justice. The Qatar National Vision 2030 and the State’s third national development strategy 2024-2030 included key measures addressing children’s rights, and promoted equality and non-discrimination of children.

    The delegation said Qatar had reduced sentences for cases where perpetrators of crimes were children.  Sanctions for children under 16 years did not include corporal punishment or flagellation.  The draft law on the rights of the child would increase the minimum age of criminal liability and define all persons less than 18 years old as children.  It would be adopted and published soon.

    The delegation also said the death penalty could be imposed on children aged 16 to 18, who were more aware of their actions, but judges could commute the sentence, considering the age of the child when the crime was committed.  No one aged 16 to 18 had been sentenced to death in Qatar.

    The Qatari Nationality Code addressed the issue of kinship, the delegation said.  Children of non-Qatari fathers were given the nationality of their father, but such children also had the ability to access Qatari nationality if they had permanent residence.  The State had made great strides in reducing statelessness.

    In closing remarks, Ms. Sidikou said many efforts had been made by the State for children, but challenges remained.  The Committee hoped that the dialogue would help to improve protections for children in Qatar.

    Mr. Al-Hammadi, in concluding remarks, thanked the Committee and all persons who contributed to the constructive dialogue.  Qatar was committed to cooperating with the Committee and to addressing the challenges and risks it faced concerning the rights of the child.  It had achieved great progress in human rights over the years through cooperation with human rights mechanisms.

    Sophie Kiladze, Committee Chair, said in concluding remarks that the information provided by the State party would help the Committee to assess the achievements made by Qatar and the challenges it faced.  The Committee would do its best to develop concluding observations that would strengthen the rights of children in Qatar to the extent possible.

    The delegation of Qatar consisted of representatives from the Ministry of Foreign Affairs; Ministry of Interior; Ministry of Public Health; Ministry of Social Development and Family; Ministry of Education and Higher Education; Ministry of Justice; Supreme Judiciary Council; Public Prosecution; National Group for Protection of Children from Abuse and Violence; and the Permanent Mission of Qatar to the United Nations Office at Geneva.

    The Committee will issue the concluding observations on the report of Qatar at the end of its ninety-ninth session on 30 May. Those, and other documents relating to the Committee’s work, including reports submitted by States parties, will be available on the session’s webpage.  Summaries of the public meetings of the Committee can be found here, while webcasts of the public meetings can be found here.

    The Committee will next meet in public this afternoon at 3 p.m. to consider the combined fifth to seventh periodic reports of Brazil (CRC/C/BRA/5-7).

    Report

    The Committee has before it the fifth and sixth combined periodic reports of Qatar (CRC/C/QAT/5-6).

    Presentation of Report

    AHMAD BIN HASSAN AL-HAMMADI, Secretary-General of the Ministry of Foreign Affairs of Qatar and head of the delegation, said that Qatar was firmly and permanently committed to the principles of the Convention. Articles 21 and 22 of the Constitution emphasised the role of the family in protecting children from exploitation and neglect, and supporting their development.  The State had worked to strengthen legislative and institutional measures to protect children’s rights in the fields of education, health, social protection and criminal justice.

    The national report was the result of consultation and cooperation between the various national authorities, civil society and children.  The State had made great efforts to address and implement most of the previous recommendations made by the Committee, contributing to tangible progress in ensuring the rights of children.

    The Qatar National Vision 2030 and the State’s third national development strategy 2024-2030 included key measures addressing human rights issues in various fields, including children’s rights, and promoted equality and non-discrimination of children.  Over the reporting period, there had been extensive legislative amendments regarding the protection and promotion of children’s rights, most notably law 22 of 2021 regulating health care services, which included provisions promoting access to health care for all children, and the anti-cybercrime law, which criminalised sexual exploitation.  A draft law on children’s rights was also currently under review; it established effective mechanisms for the protection and development of children’s capacities and promoted the best interests of the child.

    The Ministry of Social Development and Family, established in 2021, was responsible for following up on childhood issues through specialised departments on family development, community welfare, and social protection.  The Qatar Foundation for Social Work had mechanisms for monitoring, follow-up and reporting on protection measures for child victims of violence, as well as awareness campaigns informing children of their rights and methods of reporting and seeking assistance.  The State had also established the National Planning Council, which was responsible for planning and implementing public policies related to children.  The Council of Ministers approved in April 2025 the establishment of the Digital Safety Committee for Children and Young People, and an awareness campaign on the safe use of technology would also be launched in June 2025.

    Efforts had continued to increase the enrolment rates of children, including children with disabilities, in compulsory education.  The overall enrolment rate was more than 97.5 per cent.  The State was encouraging girls to enrol in scientific disciplines; the percentage of girls in these disciplines had reached about 54 per cent at the secondary level.  New schools had also been established to provide technical and specialised education for both boys and girls.  The national education strategy 2024-2030 focused on improving the quality and inclusiveness of education, ensuring equal opportunities and enhancing governance. Five “peace schools” that received children of various nationalities, especially from countries in crisis, including children with disabilities, had been established.

    In the health sector, the national health strategy 2024-2030 was launched, which aimed to promote children’s health by preventing chronic diseases such as obesity and diabetes, and paying attention to oral health.  The State had established a system of child-friendly hospitals and general paediatric clinics.  The national team for child protection from violence and neglect received approximately 500 cases annually of suspected cases of child abuse and implemented preventive measures in response.  Effective countermeasures adopted during the COVID-19 pandemic contributed to Qatar having one of the lowest child mortality rates globally.

    Qatar’s Labour Code protected children from exploitation, prohibited their employment before reaching the legal age, and regulated the types of work that children could not do.  Moreover, the consumer protection law and the food control law promoted children’s rights as vulnerable consumers, while the Ministries of Health and Commerce were closely monitoring to ensure safe and healthy food for children.  The State had also launched plans to reduce and assess environmental pollution, especially in areas near schools and residential areas.

    The State had also paid attention to building the capacity of professionals working with children, such as judges, teachers, doctors and media professionals, through training programmes on the Convention delivered in cooperation with civil society.  Qatar was also studying the possibility of establishing a national children’s parliament and had established interactive platforms that allowed children to express their opinions and suggestions, especially when discussing policies that directly affected their lives.

    To protect children’s rights, Qatar was cooperating with United Nations agencies, including the United Nations Children’s Fund, which opened an office at the United Nations House in Doha in 2022. It was working to protect children in conflict areas in countries such as Syria, Palestine, Yemen, Somalia, Afghanistan, Russia and Ukraine.  The Qatari Education Above All initiative had reached over 17 million children in more than 65 countries.  Qatar had provided humanitarian assistance, including food and health care, to children in Gaza.

    Qatar was fully committed to the implementation of the Convention and its two Optional Protocols, and the protection of children’s rights.  Achieving this goal required continuous reform efforts through measures that kept pace with emerging changes and challenges.

    Questions by Committee Experts 

    AISSATOU ALASSANE SIDIKOU, Committee Expert and Taskforce Coordinator for Qatar, commended Qatar’s efforts to invest in children’s health and education; implement its national development programme, which promoted sustainable development; establish its Ministry on the Rights of Children and Families; and implement the Committee’s recommendations. Why had the State party maintained its reservations to articles two and 14 of the Convention?  The provisions in article two of the Convention were much broader than those of articles 34 and 35 of the Constitution. 

    Why was there was no schedule for adoption of the draft bill on children’s rights, which had been considered by the State for over 15 years?  Would the bill increase the minimum age of criminal responsibility of children, which was currently at seven years, and prohibit imprisonment, flagellation and forced labour for children, which was currently allowed from 16 years of age?  Did the National Human Rights Commission and the National Planning Council have sufficient resources?  How did they coordinate to protect child rights?

    Qatar’s investments in health and education had increased in 2022 and 2024, but these amounts were still below global standards.  Would this be addressed?  Were funds allocated for children in the budget clearly outlined?  How did the State party ensure that resources were equitably assigned?  A national survey conducted in 2023 contained very little information on vulnerable children. What was being done to strengthen data collection on such children?

    Did migrant children have access to mechanisms to report violations of their rights?  How did the State party support access to remedies for child victims? Were there capacity building and awareness raising mechanisms on child rights for State officials, civil society, the media and the public?  Did the National Human Rights Commission’s monitoring mechanism follow up on the implementation of the Convention and receive complaints on violations of the rights of children, including from migrant children?  How did the State party monitor policies and programmes on children’s rights?  Were there regulations that promoted compliance with international standards on children’s rights in the private sector?

    Girls in Qatar continued to face multiple forms of discrimination due to traditional beliefs.  What actions had been taken to change these negative social norms?  Children with disabilities, children with unmarried or foreign parents, and the children of migrant workers were subject to widespread discrimination.  How did the State party ensure that all children had access to basic social services?  Was there a general law prohibiting all forms of discrimination?

    There were no guidelines for professionals on determining the best interests of the child.  Would these be developed?  How did the State party ensure that this principle was applied consistently in all legal procedures?  In Qatar, children could be sentenced to death.  What measures were in place to strictly prohibit the application of the death penalty on children?  How did the State party facilitate the participation of children in matters affecting them?

    Despite the recommendations of various human rights mechanisms, the new nationality law did not allow Qatari women married to foreign citizens to pass on their nationality to their children. What steps had been taken to amend this law and other laws to allow Qatari women to pass on their nationality to their children?

    ROSARIA CORREA, Committee Expert and Taskforce Member, welcomed that the State party had taken several measures to address corporal punishment.  Had it assessed the impact that these measures had had on society? There was no law prohibiting corporal punishment.  What legislative efforts had been made to prohibit corporal punishment in all settings? Had studies into violent disciplining been carried out?  What measures had schools adopted to protect children?  How many child victims of violence had received remedies?  How was the State party monitoring child protection measures?  Did the draft bill on child rights address the child protection system?  Who was responsible for representing minors in the courts?

    How was the State party combatting the sale and trafficking of children domestically and internationally?  What was preventing the State from developing a law to ban child marriages?  How did the electronic monitoring system for convicted children work and how effective was it?  What social and psychological programmes were in place to protect the rights of children in conflict with the law and prevent their stigmatisation?

    TIMOTHY P.T. EKESA, Committee Expert and Taskforce Member, welcomed the data on children with disabilities that the State party had collected in 2016.  There were concerns that the State party did not provide access to mainstream education to all children with disabilities, as many were enrolled in special schools.  Only a small percentage of schools had inclusive education programmes, and a medical model was used to determine whether children with disabilities were enrolled in special schools.  Many children with disabilities remained out of school due to denial of admission or the inability of their families to pay school fees.  Could the State party provide data on the number of children with disabilities enrolled in mainstream education?

    Responses by the Delegation

    The delegation said its reservations to articles two and 14 of the Convention were consistent with Islamic Sharia and public morals.  The draft law on the rights of the child would increase the minimum age of criminal liability.  It would be adopted and published soon.

    In 2016, a programme was set up to investigate cases of violations of children’s rights and provide protection and remedies to victims.  It dealt with between 500 and 600 cases a year, some 30 per cent of which involved violence and negligence.  The programme included awareness raising campaigns on children’s rights and on reporting mistreatment of children.  A confidential hotline had been set up for reporting violence; it received 300 calls a year, 60 per cent of which came from children.  A register for cases of child abuse had recorded some 3,000 cases in recent years, and the Qatari Care Centre had provided psychological care to more than 4,000 children.  A conference on combatting violence against children held in 2020 in Qatar was attended by around 2,000 people.

    Qatar monitored the impact of business activities on children, guided by the United Nations Guiding Principles on Business and Human Rights.  The National Human Rights Committee monitored child labour but had not registered any cases. A regional conference had been held in Qatar that had called on businesses not to violate children’s rights in digital spaces.

    The Ministry of Social Affairs had signed a memorandum of understanding with the National Human Rights Committee on cooperation on protecting children’s rights.  This Committee was made up of eight representatives of civil society and five Government employees.  It reviewed legislation concerning children, visited schools to assess violations of children’s right to education, and conducted yearly awareness raising campaigns on the Convention.

    Qatari law did not permit marriages for boys under the age of 17 and girls under the age of 16.  Marriages under the age of 18 were permitted by judges only when there were exceptional circumstances.  A committee had been set up to review the Family Code; it was considering revising the legal minimum age of marriage.  It was very rare for families to allow their children to marry before the age of 18.

    Some six per cent of the national budget was allocated to education, and some 25 per cent of the Ministry of Social Affairs’ budget was allocated to programmes for children.  The State party had dispersed several million Qatari riyals for supporting vulnerable children and families.  A new centre for orphans was established in 2024.

    The Ministry of Education promoted gender equality at all stages of education.  Enrolment rates for boys and girls were equal at primary and secondary schools, and literacy rates were over 99 per cent in 2023.  The Ministry had launched awareness raising campaigns on human rights and non-discrimination.  Guidance was provided to teachers on preventing discrimination against children.  Qataris and non-Qataris received the same treatment in State schools and hospitals. Employers provided migrant workers with health insurance.

    The Qatari Nationality Code addressed the issue of kinship.  Children of non-Qatari fathers were given the nationality of their father, but such children also had the ability to access Qatari nationality if they had permanent residence.  The State had made great strides in reducing statelessness.

    Qatar had laws that enabled children to receive remedies such as compensation if they were victims of a crime. Specialised courts for crimes committed by children and cases of violence against children had been established, which could conduct hearings online.  There was also a witness protection programme for children. Courts had an interpretation and translation service that supported foreign children.  The State assigned lawyers to persons who could not afford them.

    All schools had student councils that allowed students to express their views on issues such as the environment, culture and education.  Cultural activities were organised for children.  Each school calculated its carbon footprint.

    Articles 21 and 68 of the Constitution incorporated the Convention into the legal order.  The State party had increased penalties for trafficking in persons when the victim was under 18 and reduced sentences for cases where perpetrators of crimes were children.  Sanctions for children under 16 years did not include corporal punishment, flagellation or the death penalty. 

    Articles permitting corporal punishment were removed from legislation after the adoption of the Convention. Persons, including parents, who used corporal punishment were held criminally liable.  Guidelines had been developed for parents on disciplining children without using corporal punishment and a centre that worked to educate parents on protecting children had been set up.  Corporal punishment in schools was banned in the 1990s. Inspectors conducted visits to schools to ensure that the rights of students were not violated. 

    The Prosecutor’s Office stepped in if there were conflicts of interest between parents and children.  Child psychologists were deployed to determine the best interests of the child.  Children’s confidentiality was protected in courts.

    The Ministry of Education attached great importance to inclusive education.  Curricula were adapted for children with disabilities and protocols had been adopted for children with autism.  There were programmes for vocational training for children with disabilities.

    Questions by Committee Experts

    ROSARIA CORREA, Committee Expert and Country Taskforce Member, said that Qatar had a set of measures to combat violence between children in schools.  Were there response measures and a recording mechanism for such violence? Some 83 per cent of children reportedly suffered from some form of harassment in primary school.

    What measures had been taken to ensure children could grow up in a pollution-free environment and access green spaces?  How did education programmes address climate change?  What impact was climate change having on Qatari children and how was the State working to mitigate its effects?  How was the State party encouraging children’s involvement in designing environmental policies?  How did the State party monitor children’s nutrition?

    How did the State party ensure that parents equally shared responsibilities concerning child-rearing? When parents divorced, the mother lost custody of her children in Qatar.  Were women who were victims of sexual exploitation criminalised in the Criminal Code?

    TIMOTHY P.T. EKESA, Committee Expert and Country Taskforce Member, said the national action plan on the inclusion of children with disabilities in schools had commendable objectives, but there was a lack of clarity on measures being implemented to achieve inclusion. Had the plan, which expired in 2023, been renewed?  Were there provisions in draft legislation on persons with disabilities that prohibited discrimination against children with disabilities in education?  The Committee had previously called on the State party to implement a national action plan on human rights education; had this been done?

    The Committee commended the State party’s high quality and widely accessible health care system and the launch of the national health strategy for 2023-2030.  Would children receive targeted attention under the strategy? There were reports of discrimination in access to health centres for non-Qatari citizens.  What measures were in place to address disparities in access to healthcare?  Qatar had one of the highest rates of adolescent obesity in the region.  How was the State party addressing this?  How was it promoting access to mental health for children and adolescents?

    BENOIT VAN KEIRSBILCK, Committee Expert and Country Taskforce Member, said that Qatar had not ratified the United Nations Educational, Scientific and Cultural Organization Convention against Discrimination in Education.  Why was this?  Why did most Qatari families choose private schools, while non-Qataris typically attended public schools?  What was the State party doing to support education costs?  There were schools that supported children who had dropped out of school; how effective were they?  Was there an official sexual and reproductive health education programme in schools? What was being done to promote access to safe and inclusive spaces for play and recreation?

    The Committee was concerned that Qatar continued to detain migrant children and families.  In which detention centres were migrants placed? Were there plans to revise the policy of detaining migrant children?  Most migrant workers in Qatar were men.  Were there plans to revise family reunification rules to make it more accessible for workers with low wages?  Were there plans to regularise the children of migrants born in Qatar?

    Members of the Al-Ghufran clan had been deprived of their nationality many years ago. How many of these people still did not have Qatari nationality, and were there plans to resolve their situation? How did the State party ensure that migrant children could enrol in schools and how did it investigate complaints issued by domestic workers?  How many girls were working as domestic workers?  What programmes were in place that supported children in street situations? What results had been achieved by the law on trafficking in persons?  What measures had been implemented to prevent and prosecute cases of trafficking in children occurring during the 2022 World Cup?

    Qatar had one of the lowest minimum ages of criminal responsibility in the world, at seven years of age, and many legal protections for child offenders only applied for children under age 16.  How many children up to 18 years old were deprived of liberty and in what settings? Were they mixed with adults?  Were children in detention informed about the National Human Rights Committee’s complaints mechanism?  Did the State party intend to ratify the Safe Schools Declaration?

    Responses by the Delegation

    The delegation said corporal punishment against all persons was prohibited, including punishment of persons with disabilities.  There was no dedicated legislation on domestic violence, but there were legislative measures that covered domestic violence, and a court had been set up that specialised in domestic violence and temporary shelters, mandated to protect women and children who were victims of domestic violence.  In 2024, the State party organised workshops training for around 5,000 people on issues such as protecting children from violence and intimidation.  There were around 40,000 confirmed cases of domestic violence between 2024 and 2025.

    Initiatives had been adopted to minimise the impact of climate change on children, including adaption of infrastructure and measures to reduce carbon emissions and increase the use of renewable energy.  The State party had constructed 18 square kilometres of green zones in 2023 and an additional eight in 2024.  There was also a course within the school curriculum that focused on protecting the environment and living sustainably.  Schools celebrated a “sustainability week”.  Qatar had also taken measures to ensure the provision of good quality water.  It periodically monitored water and air quality in schools, kindergartens and public hospitals. 

    Qatar promoted children’s health through various measures.  Nine free health check-ups were provided to children up to age five.  The State party encouraged exclusive breastfeeding up to six months; there had been a sharp increase in breastfeeding rates over the past decade.  The State party had developed programmes to tackle the child obesity rate, which aimed to reduce this rate by 30 per cent by 2030.  School nutrition clinics provided specialised services to prevent childhood obesity and nutritional problems.  A 2022 law governed universal healthcare coverage.

    Sexual and reproductive health education and education on drug addiction were provided in schools from primary level, and there was also teaching on the protection of children from neglect, and online and sexual exploitation.  Children were instructed on how to find psychological assistance, and on alerting authorities about threats.

    Qatar promoted access to a healthy environment for children with disabilities.  It had beaches that had been adapted to ensure accessibility.  Various projects were being developed for children with disabilities up to 2030.  A single database covering all children with disabilities in the education system had been set up.  Qatar had over 5,300 pupils with disabilities in public and private schools.  Some 62 per cent of schools were inclusive. There were specialised training programmes for children with disabilities that supported them to become autonomous.

    Children with disabilities had access to specialised healthcare through 10 healthcare centres tailored to their needs, including four centres for children with autism.  The third national strategy 2024-2030 included measures for improving rehabilitation and diagnosis services for persons with disabilities. Social workers, family and community members were trained to care for children with disabilities and support their inclusion in society. 

    Qatari legislators sought to recognise children with disabilities as having legal capacity on par with others, and to promote their access to work, education and other rights.  The draft disability code had been developed and was now being deliberated by the Government.  Measures to exempt persons with disabilities from certain Government fees were being developed.  Legislators sought to promote access to complaints mechanisms for children with disabilities and their families.  The State funded legal aid services to support children in court, including children with disabilities.

    The draft child code defined all persons less than 18 years old as children.

    As part of the 2024-2030 development strategy, the State party had visited schools and engaged in dialogue with students, parents and teachers.  “Sustainability ambassadors” who promoted environmental protection were appointed in schools, and young people could contribute to the Shura Council. Many children had taken part in drafting the State party’s report.

    The State party was promoting awareness of human rights for children through social education courses and campaigns in schools, through which children learned about the Convention, gender equality, democracy, acceptance of others, cybersecurity, and preventing bullying.  Media campaigns on children’s rights were carried out and manuals and training programmes had been developed to inform teachers, social workers and other public officials about children’s rights.  The State party organised annual events to mark Children’s Day.

    Qatar was committed to protecting school establishments from attack.  It had signed the Safe Schools Declaration and participated in the Education for All initiative.  Qatar helped organise events on 9 September each year at United Nations offices in New York and Geneva to mark the International Day to Protect Education from Attack.

    Public schools applied international standards, including the international baccalaureate programme. Migrant parents could choose the school that their children attended and the language of instruction.  The State ensured the provision of free schooling to students coming from regions of armed conflict.

    Questions by Committee Experts

    BENOIT VAN KEIRSBILCK, Committee Expert and Country Taskforce Member, asked whether police provided sexual education in schools?  Was legal aid free for every child and accessible from the first stage of arrest? Did the State party criminally prosecute children who were addicted to drugs?

    TIMOTHY P.T. EKESA, Committee Expert and Country Taskforce Member, said Qatar generally prohibited abortion, only allowing it in three special cases.  There were severe penalties imposed on women who received unauthorised abortions.  How many unauthorised abortions had the State recorded over the reporting period?

    Another Committee Expert asked about the likelihood of approving the children’s act soon.  Would Qatar provide a complete definition of the child in this legislation?

    A Committee Expert asked about awareness raising campaigns in place to reduce the rate of child deaths from road accidents, which remained quite high in Qatar.  How was wastewater treated and what percentage of the population had access to potable water?

    One Committee Expert asked if Qatari children had access to contraception.  Were children who were the product of rape given Qatari nationality? Did national institutions take a gender specific approach?  Was free legal assistance provided to victims of domestic violence?

    A Committee Expert asked about the level of integration that the State party’s hotline had with law enforcement, health services and social services.  What services were provided to children of adults deprived of liberty, including adults on death row?

    SOPHIE KILADZE, Committee Chair, asked whether the State party had measures to reduce children’s screen time and a policy on artificial intelligence and its effects on children.

    Responses by the Delegation

    The delegation said the 2015 law on the departure of migrants set up a mechanism for entering and exiting Qatar. It regulated the provision of housing, healthcare and education for migrants, as well as the conditions migrants needed to meet to obtain residence permits.  Migrants who did not meet these conditions were deported following the standard procedure.  Persons without identity documents who were accompanied by children, as well as stateless and unaccompanied children, were placed in a shelter while being processed. In 2024, there were 22 such detentions, and thus far there had been six detentions in 2025.  The State party worked with relevant embassies to support processing of these people.

    A directorate had been established that was mandated to prevent road accidents.

    Psychological support was provided to children whose parents had been sentenced to death.  The Criminal Procedural Code provided for two years of reprieve from detention for pregnant women, and when both parents were charged with the same crime, one parent was granted reprieve from detention to care for their children while the other parent was detained.

    The age of criminal liability started from seven years.  From ages seven to 16, judges could only impose sanctions requiring the child’s parents to obey certain commitments or send the child to rehabilitation programmes. The juvenile justice system was based on rehabilitation, not punishment.  Children aged 16 to 18 were more aware of their actions and thus had increased criminal liability.  The death penalty could be used on such children, but judges could commute the sentence, considering the age of the child when the crime was committed.  No one aged 16 to 18 had been sentenced to death in Qatar.

    Qatar had evacuated over 65,000 people from Afghanistan in 2021.  Qatar provided these people with housing and psychological support and facilitated their voluntary travel to other countries.  The State had also evacuated many children from Gaza to Qatar, providing them with free healthcare and education.

    Sexual education was provided by teachers and social workers, not police, in schools.  A national workshop had been set up to develop sexual education; psychologists were involved in this process.

    The State had a legal aid office with attorneys who provided children with free legal assistance and defended them in court.  The office also provided assistance in cases of domestic violence.

    Islamic Sharia was the source of laws in Qatar.  Criminal legislation on abortion was in line with Sharia.  In the State’s view, foetuses had the same rights as adults and benefited from legal protection.  Abortions could only take place if the pregnancy threatened the life of the mother.  Children who were the product of rape could access Qatari nationality.

    Qatar had created legislation combatting cybercrime, which punished all digital intimation and threats.  There were harsher sentences when the victim was a child or had a disability.  The State had also launched a platform that aimed to educate children and families on the safe use of digital technology and build children’s digital skills.  It had a national strategy on artificial intelligence and was committed to developing digital infrastructure that respected human rights. 

    Qatar had acceded to International Labour Organization Conventions 138 and 180 on child labour.  The State’s law on domestic workers protected such workers from exploitation.  The law banned hiring people under 18 years of age for domestic work.  Migrant workers needed to be 18 years of age or older. Domestic workers had the same rights as other workers, including regarding access to healthcare.  There was a Government Department that received complaints from domestic workers, which operated in 11 different languages.

    The State party respected the rights of migrant workers to live with their families.  These workers could bring their children to the State if they fulfilled a strict set of conditions.

    Qatar had criminalised all forms of trafficking of persons, including labour exploitation.  Penalties for trafficking were increased when the victim was a child.  There was a committee within the Ministry of Labour that was responsible for combatting trafficking in persons.  Qatari law was in line with the Optional Protocol on the sale of children, child prostitution and child pornography.

    The hotline for reporting violations of children’s rights was manned by psychologists, who assessed the urgency of the complaint and referred it to the relevant authorities.

    The Qatar Social Work Foundation worked to enhance family bonds and to prevent domestic violence.  It provided lectures for prospective parents and counselling and mediation services seeking to resolve family problems amicability. The Foundation worked to defend children’s rights in cases of divorce, providing them with psychological counselling. Legislation had been developed that ensured that custody could be provided to mothers in cases of divorce.

    Concluding Remarks 

    AISSATOU ALASSANE SIDIKOU, Committee Expert and Taskforce Coordinator, thanked the delegation for the interesting dialogue.  Many efforts had been made by the State for children, but challenges remained.  The Committee hoped that the dialogue would help to improve protections for children in Qatar.  Ms. Sidikou said she hoped that the members of the State party would carry all children in their hearts in their work.

    AHMAD BIN HASSAN AL-HAMMADI, Secretary-General of the Ministry of Foreign Affairs of Qatar and head of the delegation, thanked the Committee and all persons who had contributed to the constructive dialogue, which was an important opportunity to promote the rights of the child and global peace.  The State party would use the Committee’s concluding observations to improve measures for children.  The Committee needed to consider the information provided by the State and its cultural specificities.  Qatar was committed to cooperating with the Committee and to addressing the challenges and risks it faced concerning the rights of the child.  It had achieved great progress in human rights over the years through cooperation with human rights mechanisms.

    SOPHIE KILADZE, Committee Chair, said that the information provided by the State party would help the Committee to assess the achievements made by Qatar and the challenges it faced. The Committee respected States’ cultural specificities, but violations of the Convention could not be justified in any circumstances.  The Committee would do its best to develop concluding observations that would strengthen the rights of children in Qatar to the extent possible.  It hoped that the State party would present further progress for children in its next dialogue with the Committee.

    ___________

    Produced by the United Nations Information Service in Geneva for use of the media; 
    not an official record. English and French versions of our releases are different as they are the product of two separate coverage teams that work independently.

     

    CRC25.014E

    MIL OSI United Nations News –

    May 27, 2025
  • MIL-OSI USA: New Best Practices Guide for Securing AI Data Released

    News In Brief – Source: US Computer Emergency Readiness Team

    This information sheet highlights the critical role of data security in ensuring the accuracy, integrity, and trustworthiness of AI outcomes. It outlines key risks that may arise from data security and integrity issues across all phases of the AI lifecycle, from development and testing to deployment and operation. 

    Defense Industrial Bases, National Security Systems owners, federal agencies, and Critical Infrastructure owners and operators are encouraged to review this information sheet and implement the recommended best practices and mitigation strategies to protect sensitive, proprietary, and mission critical data in AI-enabled and machine learning systems. These include adopting robust data protection measures; proactively managing risks; and strengthening monitoring, threat detection, and network defense capabilities. 

    As AI systems become more integrated into essential operations, organizations must remain vigilant and take deliberate steps to secure the data that powers them. For more information on securing AI data, see CISA’s Artificial Intelligence webpage. 

    MIL OSI USA News –

    May 27, 2025
  • MIL-OSI USA: AI Data Security: Best Practices for Securing Data Used to Train & Operate AI Systems

    News In Brief – Source: US Computer Emergency Readiness Team

    Executive summary

    This Cybersecurity Information Sheet (CSI) provides essential guidance on securing data used in artificial intelligence (AI) and machine learning (ML) systems. It also highlights the importance of data security in ensuring the accuracy and integrity of AI outcomes and outlines potential risks arising from data integrity issues in various stages of AI development and deployment.

    This CSI provides a brief overview of the AI system lifecycle and general best practices to secure data used during the development, testing, and operation of AI-based systems. These best practices include the incorporation of techniques such as data encryption, digital signatures, data provenance tracking, secure storage, and trust infrastructure. This CSI also provides an in-depth examination of three significant areas of data security risks in AI systems: data supply chain, maliciously modified (“poisoned”) data, and data drift. Each section provides a detailed description of the risks and the corresponding best practices to mitigate those risks. 

    This guidance is intended primarily for organizations using AI systems in their operations, with a focus on protecting sensitive, proprietary, or mission critical data. The principles outlined in this information sheet provide a robust foundation for securing AI data and ensuring the reliability and accuracy of AI-driven outcomes.

    This document was authored by the National Security Agency’s Artificial Intelligence Security Center (AISC), the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC), the New Zealand’s Government Communications Security Bureau’s National Cyber Security Centre (NCSC-NZ), and the United Kingdom’s National Cyber Security Centre (NCSC-UK). 

    The goals of this guidance are to: 

    1. Raise awareness of the potential risks related to data security in the development, testing, and deployment of AI systems;
    2. Provide guidance and best practices for securing AI data across various stages of the AI lifecycle, with an in-depth description of the three aforementioned significant areas of data security risks; and
    3. Establish a strong foundation for data security in AI systems by promoting the adoption of robust data security measures and encouraging proactive risk mitigation strategies.

    Download the PDF version of this report: 

    Introduction

    The data resources used during the development, testing, and operation of an AI1 system are a critical component of the AI supply chain; therefore, the data resources must be protected and secured. In its Data Management Lexicon, [1] the Intelligence Community (IC) defines Data Security as “The ability to protect data resources from unauthorized discovery, access, use, modification, and/or destruction…. Data Security is a component of Data Protection.” 

    Data security is paramount in the development and deployment of AI systems. Therefore, it is a key component of strategies developed to safeguard and manage the overall security of AI-based systems. Successful data management strategies must ensure that the data has not been tampered with at any point throughout the entire AI system lifecycle; is free from malicious, unwanted, and unauthorized content; and does not have unintentional duplicative or anomalous information. Note that AI data security depends on robust, fundamental cybersecurity protection for all datasets used in designing, developing, deploying, operating, and maintaining AI systems and the ML models that enable them.

    Audience and scope

    This CSI outlines potential risks in AI systems stemming from data security issues that arise during different phases of an AI deployment, and it introduces recommended protocols to mitigate these risks. This guidance builds upon the NSA’s joint guidance on Deploying AI Systems Securely [2] and delves deeper into securing the data used to train and operate AI-based systems. This guidance is primarily developed for organizations that use AI systems in their day-to-day operations, including the Defense Industrial Base (DIB), National Security System (NSS) owners, Federal Civilian Executive Branch (FCEB) agencies, and critical infrastructure owners and operators. Implementing these mitigations can help secure AI-enabled systems and protect proprietary, sensitive, and/or mission critical data.

    Securing data throughout the AI system lifecycle

    Data security is a critical enabler that spans all phases of the AI system lifecycle. ML models learn their decision logic from data, so an attacker who can manipulate the data can also manipulate the logic of an AI-based system. In the AI Risk Management Framework (RMF) [3], the National Institute of Standards and Technology (NIST) defines six major stages in the lifecycle of AI systems, starting from Plan & Design and progressing all the way to Operate & Monitor. The following table highlights relevant data security factors for each stage of the AI lifecycle: 

    Table 1: The AI System Lifecycle with key dimensions, necessary ongoing assessments, focus areas for data security, and particular data security risks covered in this CSI. [3] 
    AI Lifecycle Stage Key Dimensions Test, Evaluation, Verification, & Validation (TEVV) Potential Focus Areas for Data Security Particular Data Security Risks Covered in this CSI
    1) Plan & Design Application Context Audit & Impact Assessment Incorporating data security measures from inception, designing robust security protocols, threat modeling, and including privacy by design Data supply chain
    2) Collect & Process Data Data & Input Internal & External Validation Ensuring data integrity, authenticity, encryption, access controls, data minimization, anonymization, and secure data transfer Data supply chain,
    maliciously modified data
    3) Build & Use Model AI Model Model Testing Protecting data from tampering, ensuring data quality and privacy (including differential privacy and secure multi-party computation when appropriate and possible), securing model training, and operating environments   Data supply chain,
    maliciously modified data
    4) Verify & Validate AI Model Model Testing Performing comprehensive security testing, identifying and mitigating risks, validating data integrity, adversarial testing, and formal verification when appropriate and possible Data supply chain,
    maliciously modified data
    5) Deploy & Use Task & Output Integration, Compliance Testing, Validation Implementing strict access controls, zero-trust infrastructure, secure data transmission and storage, secure API endpoints, and monitoring for anomalous behavior Data supply chain,
    maliciously modified data,
    data drift
    6) Operate & Monitor Application Context Audit & Impact Assessment Conducting continuous risk assessments, monitoring for data breaches, deleting data securely, complying with regulations, incident response planning, and regular security auditing Data supply chain,
    maliciously modified data, data drift

    Throughout the AI system lifecycle, securing data is paramount to maintaining information integrity and system reliability. Starting with the initial Plan & Design phase, carefully plan data protection measures to provide proactive mitigations of potential risks. In the Collect & Process Data phase, data must be carefully analyzed, labeled, sanitized, and protected from breaches and tampering. Securing data in the Build & Use Model phase helps ensure models are trained on reliably sourced, accurate, and representative information. In the Verify & Validate phase, comprehensive and thorough testing of AI models, derived from training data, can identify security flaws and enable their mitigation. 

    Note that Verification & Validation is necessary each time new data or user feedback is introduced into the model; therefore, that data also needs to be handled with the same security standards as AI training data. Implementing strict access controls protects data from unauthorized access, especially in the Deploy & Use phase. Lastly, continuous data risk assessments in the Operate & Monitor phase are necessary to adapt to evolving threats. Neglecting these practices can lead to data corruption, compromised models, data leaks, and non-compliance, emphasizing the critical importance of robust data security at every phase.

    Best practices to secure data for AI-based systems

    The following list contains recommended practical steps that system owners can take to better protect the data used to build and operate their AI-based systems, whether running on premises or in the cloud. For more details on general cybersecurity best practices, see also NIST SP 800-53, “Security and Privacy Controls for Information Systems and Organizations.” [33]

    1. Source reliable data and track data provenance
    Verify data sources use trusted, reliable, and accurate data for training and operating AI systems. To the extent possible, only use data from authoritative sources. Implement provenance tracking to enable the tracing of data origins, and log the path that data follows through an AI system. [7],[8],[9] Incorporate a secure provenance database that is cryptographically signed and maintains an immutable, append-only ledger of data changes. This facilitates data provenance tracking, helps identify sources of maliciously modified data, and helps ensure that no single entity can undetectably manipulate the data.
    2. Verify and maintain data integrity during storage and transport
    Maintaining data integrity2 is an essential component to preserve the accuracy, reliability, and trustworthiness of AI data. [4] Use checksums and cryptographic hashes to verify that data has not been altered or tampered with during storage or transmission. Generating such unique codes for AI datasets enables the detection of unauthorized changes or corruption, safeguarding the information’s authenticity.

    3. Employ digital signatures to authenticate trusted data revisions
    Digital signatures help ensure data integrity and prevent tampering by third parties. Adopt quantum-resistant digital signature standards [5][6] to authenticate and verify datasets used during AI model training, fine tuning, alignment, reinforcement learning from human feedback (RLHF), and/or other post-training processes that affect model parameters. Original versions of the data should be cryptographically signed, and any subsequent data revisions should be signed by the person who made the change. Organizations are encouraged to use trusted certificate authorities to verify this process.
    4. Leverage trusted infrastructure
    Use a trusted computing environment that leverages Zero Trust architecture. [10] Provide secure enclaves for data processing and keep sensitive information protected and unaltered during computations. This approach fosters a secure foundation for data privacy and security in AI data workflows by isolating sensitive operations and mitigating risks of tampering. Trusted computing infrastructure supports the integrity of data processes, reduces risks associated with unverified or altered data, and ultimately creates a more robust and transparent AI ecosystem. Trusted environments are essential for AI applications where data accuracy directly impacts their decision-making processes.
    5. Classify data and use access controls
    Categorize data using a classification system based on sensitivity and required protection measures. [11] This process enables organizations to apply appropriate security controls to different data types. Classifying data enables the enforcement of robust protection measures like stringent encryption and access controls. [33] In general, the output of AI systems should be classified at the same level as the input data (rather than creating a separate set of guardrails).
    6. Encrypt data
    Adopt advanced encryption protocols proportional to the organizational data protection level. This includes securing data at rest, in transit, and during processing. AES-256 encryption is the de facto industry standard and is considered resistant to quantum computing threats. [12],[13] Use protocols, such as TLS with AES-256 or post-quantum encryption, for data in transit. Refer to NIST SP 800-52r2, “Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations” [14] for more details.
    7. Store data securely
    Store data in certified storage devices that enforce NIST FIPS 140-3 [15] compliance, ensuring that the cryptographic modules used to encrypt the data provide high-level security against advanced intrusion attempts. Note that Security Level 3 (defined in NIST FIPS 140-2 [16]) provides robust data protection; however, evaluate and determine the appropriate level of security based on organizational needs and risk assessments.
    8. Leverage privacy-preserving techniques 
    There are several privacy-preserving techniques [17] that can be leveraged for increased data security. Note that there may be practical limitations to their implementation due to computational cost.

    • Data depersonalization techniques (e.g., data masking [18]) involve replacing sensitive data with inauthentic but realistic information that maintains the distributions of values throughout the dataset. This enables AI systems to utilize datasets without exposing sensitive information, reducing the impact of data breaches and supporting secure data sharing and collaboration. When possible, use data masking to facilitate AI model training and development without compromising sensitive information (e.g., personally identifiable information [PII]).
    • Differential privacy is a framework that provides a mathematical guarantee quantifying the level of privacy of a dataset or query. It requires a pre-specified privacy budget for the level of noise added to the data, but there are tradeoffs between protecting the training data from membership inference techniques and target task accuracy. Refer to [17] for further details.
    • Decentralized learning techniques (e.g., federated learning [19]) permit AI system training over multiple local datasets with limited sharing of data among local instances. An aggregator model incorporates the results of the distributed models, limiting access on the local instance to the larger training dataset. Secure multi-party computation is recommended for training and inferencing processes.

    9. Delete data securely
    Prior to repurposing or decommissioning any functional drives used for AI data storage and processing, erase them using a secure deletion method such as cryptographic erase, block erase, or data overwrite. Refer to NIST SP 800-88, “Guidelines for Media Sanitization,” [20] for guidance on appropriate deletion methods.
    10. Conduct ongoing data security risk assessments
    Conduct ongoing risk assessments using industry-standard frameworks, such as the NIST SP 800-3r2, Risk Management Framework (RMF) [4][21], and the NIST AI 100-1, Artificial Intelligence RMF [3]. These assessments should evaluate the AI data security landscape, identify risks, and prioritize actions to minimize security incidents. Continuously improve data security measures to keep pace with evolving threats and vulnerabilities, learn from security incidents, stay up to date with emerging technologies, and maintain a robust security posture. 

    Data supply chain – risks and mitigations

    Relevant AI Lifecycle stages: 1) Plan & Design; 2) Collect & Process Data; 3) Build & Use Model; 4) Verify & Validate; 5) Deploy & Use; 6) Operate & Monitor

    Developing and deploying secure and reliable AI systems requires understanding potential risks and methods of introducing inaccurate or maliciously modified (a.k.a. “poisoned”) data into the system. In short, the security of AI systems depends on thorough verification of training data and proactive measures to detect and prevent the introduction of inaccurate material.

    Threats can stem from large-scale data collected and curated by third parties, as well as from data that is not sufficiently protected after ingestion. Data collected and/or curated by a third party may contain inaccurate information, either unintentionally or through malicious intent. Inaccurate material can compromise not only models trained using that data, but also any additional models that rely on compromised models as a foundation.  

    It is crucial, therefore, to verify the integrity of the training data used when building an AI system. Organizations that utilize third-party data must take appropriate measures to ensure that: 1) the data is not compromised upon ingestion; and 2) the data cannot be compromised after it has been incorporated into the AI system. As such, both data curators and data consumers should follow the best practices for digital signatures, data integrity, and data provenance that are described in detail above.

    General risks for data consumers3 

    The use of web-scale databases includes all of the risks outlined earlier, and one cannot simply assume that these datasets are clean, accurate, and free of malicious content. Third-party models trained on web-scraped data used to train a model for downstream tasks could also affect the model’s learning process and result in behavior that was unintended by the AI system designer.

    From the moment data is ingested for use with AI systems, the data acquirer must secure it against insider threats and malicious network activity to prevent unauthorized modification. 

    Mitigation strategies: 

    • Dataset verification: Before ingest, the consumer or curator should verify, as much as possible, that the dataset to be ingested is free of malicious or inaccurate material. Any detected abnormalities should be addressed, and suspicious data should not be stored. The dataset verification process should include a digital signature of the dataset at time of ingestion.
    • Content credentials: Use content credentials to track the provenance of media and other data. Content credentials are “metadata that are secured cryptographically and allow creators the ability to add information about themselves or their creative process, or both, directly to media content…. Content Credentials securely bind essential metadata to a media file that can track its origin(s), any edits made, and/or what was used to create or modify the content…. This metadata alone does not allow a consumer to determine whether a piece of content is ‘true,’ but rather provides contextual information that assists in determining the authenticity of the content.” [24]
    • Foundation model assurances: In the case where a consumer is not ingesting a dataset but a foundation model trained by another party, the developers of the foundation model need to be able to provide assurances regarding the data and sources used and certify that their training data did not contain any known compromised data. Take care to track the training data used in various model lineages. Exercise caution before using a model without such assurances.
    • Require certification: Data consumers should strongly consider requiring a formal certification from dataset and model providers, attesting that their systems are free from known compromised data before using third-party data and/or foundation models.
    • Secure storage: After ingest, data needs to be stored in a database that adheres to the best practices for digital signatures, data integrity, and data provenance that are described in detail above. Note that an append-only cryptographically signed database should be used where feasible, but there may be a need to delete older material that is no longer relevant. Each time a data element is updated (e.g., resized, cropped, flipped, etc.) for augmentation purposes in a non-temporary fashion, then the updated data should be stored as a new entry with documented changes. The database’s certificate should be verified at the time the database is accessed for a training run. If the database does not pass the certificate check, abort the training and conduct a comprehensive database audit to discover any data modifications. 

    2023 investigations by various industry professionals explored low-resource methods for introducing malicious or inaccurate material into web-scale datasets, and potential strategies to mitigate this risk.  [29] These vulnerabilities depend on the fact that curators or collectors do not have control over the data, as seen in cases of datasets curated by third parties (e.g., LAION) or datasets that are continually updated and released (e.g., Wikipedia). 

    Risk: Curated web-scale datasets

    Curated AI datasets (e.g., LAION-2B or COYO-700M) are vulnerable to a type of technique known as split-view poisoning. This risk arises because these datasets often contain data hosted on domains that may have expired or are no longer actively maintained by their original owners. In such cases, anyone who purchases these expired domains gains control over the content hosted on them. This situation creates an opportunity for malicious actors to modify or replace the data that the curated list points to, potentially introducing inaccurate or misleading information into the dataset. In many instances, it is possible to purchase enough control of a dataset to conduct effective poisoning for roughly $1,000 USD. In some cases, effective techniques can cost as little as $60 USD (e.g., COYO-700M), making this a viable threat from low-resource threat actors. 

    Mitigation strategies:

    • Raw data hashes: Data curators should attach a cryptographic hash to all raw data referenced in the dataset. This will enable follow-on data consumers to verify that the data has not changed since it was added to the list.
    • Hash verification: Data consumers should incorporate a hash check at time of download in order to detect any changes made to it, and the downloader should discard any data that does not pass the hash check.
    • Periodic checks: Curators should periodically scrape the data themselves to verify that the data has not been modified. If any changes are detected, the curator should take appropriate steps to ensure the data’s integrity.
    • Verifying data: Curators should verify that any changed data is clean and free from inaccurate or malicious material. If the content of the data has been altered in any way, the curator should either remove it from their list or flag it for further review.
    • Certification by curators: Since the data supply chain begins with the curators, the certification process must start there as well. To the best of their ability, curators should be able to certify that, at the time of publication, the dataset contains no malicious or inaccurate material. 

    Risk: Collected web-scale datasets

    Collected web-scale datasets (e.g., Wikipedia) are vulnerable to frontrunning poisoning techniques. Frontrunning poisoning occurs when an actor injects malicious examples in a short time window before websites with crowd-sourced content collect a snapshot of their data. Wikipedia in particular conducts twice-monthly snapshots of their data and publishes these snapshots for people to download. Since the snapshots happen at known times, it is possible for malicious actors to edit pages close enough to the snapshot time so that malicious edits will be captured and published before they can be discovered and corrected. Industry analysis demonstrated potential malicious actors would be able to successfully poison as much as 6.5% of Wikipedia. [29]

    Mitigation strategies:

    • Test & verify web-scale datasets: Be cautious when using web-scale datasets that are vulnerable to frontrunning poisoning. Check that the data hasn’t been manipulated, and only use snapshots verified by a trusted party.
    • (For web-scale data collectors) Randomize or lengthen snapshots: Collectors such as Wikipedia should defend against actors making malicious edits ahead of a planned snapshot by:
    1. Randomizing the snapshot order.
    2. Freezing edits to content long enough for edits to go through review before releasing the snapshot.

      These mitigations focus on increasing the amount of time a malicious actor must maintain control of the data for it to be included in the published snapshot. Any reasonable methods that increase the time a malicious actor must control the data are also recommended. 

      Note that these mitigations are limited since they rely on trusted curators who can detect malicious edits. It is more difficult to defend against subtle edits (e.g., attempts to insert hidden watermarks) that appear valid to human reviewers but impact machine understanding.

    Risk: Web-crawled datasets 

    Web-crawled datasets present a unique intersection of the risks discussed above. Since web-crawled datasets are substantially less curated than other web-scale datasets, they bring increased risk. There are no trusted curators to detect malicious edits. There are no original curated views to which cryptographic hashes can be attached. The unfortunate reality is that “updates to a web page have no realistic bound on the delta between versions which might act as a signal for attaching trust.” [29]

    Mitigation strategies:

    • Consensus approaches: Data consumers using web-crawled datasets should rely on consensus-based approaches, since notional determinations of which domains to trust are ad-hoc and insufficient. For example, an AI developer could choose to only trust an image-caption pair when it appears on many different websites to reduce susceptibility to poisoning techniques, since a malicious actor would have to poison a sufficiently large number of websites to be successful.
    • Data curation: Ultimately, it is incumbent on organizations to ensure malicious or inaccurate material is not present in the data they use. If an organization does not have resources to conduct the necessary due diligence, then the use of web-crawled datasets is not recommended until some sort of trust infrastructure can be implemented.

    Final note on web-scale datasets and data poisoning

    Both split-view and frontrunning poisoning are reasonably straightforward for a malicious actor to execute, since they do not require particularly sophisticated methodology. These poisoning techniques should be considered viable threats by anyone looking to incorporate web-scale data into their AI systems. The danger here comes not only from directly using compromised data, but also from using models which may themselves have been trained on compromised data. 

    Ultimately, data poisoning must be addressed from a supply chain perspective by those who train and fine-tune AI models. Proper supply chain integrity and security management (i.e., selecting reliable model providers and verifying the legitimacy of the models used) can reduce the risk of data poisoning and system compromise. The most reliable providers are those who assure that they do everything possible to prevent the influence and distribution of poisoned data and models. [34] 

    Every effort must be made by those building foundation models to filter out malicious and inaccurate data. Foundation models are evolving rapidly, and filtering out inaccurate, unauthorized, and malicious training data is an active area of research, particularly at web-scale. As such, is currently impractical to prescribe precise methods for doing so; it is a best-effort endeavor. Ideally, data curators and foundation model providers should be able to attest to their filtering methods and provide evidence (e.g. test results) of their effectiveness. Likewise, if possible, downstream model consumers should include a review of the security claims as part of their security processes before accepting a foundation model for use. 

    Maliciously modified data – risks and mitigations

    Relevant AI Lifecycle stages: 2) Collect & Process Data; 3) Build & Use Model; 4) Verify & Validate; 5) Deploy & Use; 6) Operate & Monitor

    Maliciously modified data presents a significant threat to the accuracy and integrity of AI systems. Deliberate manipulation of data can result in inaccurate outcomes, poor decisions, and compromised security. Note that there are also risks associated with unintentional data errors and duplications that can affect the security and performance of AI systems. Challenges like adversarial machine learning threats, statistical bias, and inaccurate information can impact the overall security of AI-driven outcomes.

    Risk: Adversarial Machine Learning threats

    Adversarial Machine Learning (AML) threats involve intentional, malicious attempts to deceive, manipulate, or disrupt AI systems. [7],[17],[22] Malicious actors employ data poisoning to corrupt the learning process, compromising the integrity of training datasets and leading to unreliable or malicious model behavior. Additionally, malicious actors may introduce adversarial examples into datasets that, while subtle, can evade correct classification, thereby undermining the model’s performance. Furthermore, sensitive information in training datasets can be indirectly extracted through techniques like model inversion4, posing significant data security risks.

    Mitigation Strategies:

    • Anomaly detection: Incorporate anomaly detection algorithms during data pre-processing to identify and remove malicious or suspicious data points before training. These algorithms can recognize statistically deviant patterns in the data, making it possible to isolate and eliminate poisoned inputs.
    • Data sanitization: Sanitize the training data by applying techniques like data filtering, sampling, and normalization. This helps reduce the impact of outliers, noisy data, and other potentially poisoned inputs, ensuring that models learn from high-quality, representative datasets. Perform sanitization on a regular basis, especially prior to each and every training, fine-tuning, or any other process that adjusts model parameters.
    • Secure training pipelines: Secure data collection, pre-processing, and training pipelines to prevent malicious actors from tampering with datasets or model parameters.
    • Ensemble methods / collaborative learning: Implement collaborative learning frameworks that combine an ensemble of multiple, distinct AI models to reach a consensus on output predictions. This approach can help counteract the impact of data poisoning, since malicious inputs may only affect a subset of the collaborative models, allowing the majority to maintain accuracy and reliability.
    • Data anonymization: Implement anonymization techniques to protect sensitive data attributes, keeping them confidential while allowing AI models to learn patterns and generate accurate predictions.

    Risk: Bad data statements

    Bad data statements5 [7][23], such as missing metadata, can significantly influence AI data security by introducing data integrity issues that can lead to faulty model performance. Error-free metadata provides valuable contextual information about the data, including its structure, purpose, and collection methods. When metadata is missing, it becomes difficult to interpret data accurately and draw meaningful conclusions. This situation can result in incomplete or inaccurate data representation, compromising AI system performance and reliability. If metadata is modified by a malicious actor, then the security of the AI system is also at risk.

    Mitigation strategies:

    • Metadata management: Implement strong data governance practices to help ensure metadata is well-documented, complete, accurate, and secured.
    • Metadata validation: Establish data validation processes to check the completeness and consistency of metadata before data is used for AI training.
    • Data enrichment: Use available resources, such as reference data and trusted third-party data, to supplement missing metadata and improve the overall quality of the training data.

    Risk: Statistical bias6 

    Robust data security and collection practices are key to mitigating statistical bias. Executive Order (EO) 14179 mandates that U.S. government entities “develop AI systems that are free from ideological bias or engineered social agendas.” [25] Note that “an AI system is said to be biased when it exhibits systematically inaccurate behavior.” [26] Statistical bias in AI systems can arise from artifacts present in training data that can lead to artificially slanted or inaccurate outcomes. Sampling biases or biases in data collection can affect the overall outcomes and performance of AI. Left unaddressed, statistical bias can degrade the accuracy and effectiveness of AI systems. 

    Mitigation strategies:

    • Regular training data audits: Regularly audit training data to detect, assess, and address potential issues that can result in systematically inaccurate AI systems.
    • Representative training data: Ensure that training data is representative of the totality of the information relevant to any given topic to reduce the risk of statistical bias. Also ensure that AI data is properly divided into training, development, and evaluation sets without overlap to properly measure statistical bias and other measures of performance.
    • Edge cases: Identify and mitigate edge cases that can cause models to malfunction.
    • Test and correct for statistical bias: Create a repository with instances of observed model output bias. Leverage that information to improve training data audits and with reinforcement learning to “undo” some of the measured bias.

    Risk: Data poisoning via inaccurate information

    One form of data poisoning (sometimes referred to as “disinformation” [27]) involves the intentional insertion of inaccurate or misleading information in AI training datasets, which can negatively impact AI system performance, outcomes, and decision-making processes. 

    Mitigation strategies:

    • Remove inaccurate information from training data: Identify and remove inaccurate or misleading information from AI datasets to the extent feasible.
    • Data provenance and verification: Implement provenance verification mechanisms during data collection to help ensure that only accurate and reliable data is used. This process can include methods such as cross-verification, fact-checking, source analysis, data provenance tracking, and content credentials.
    • Add more training data: Increasing the amount of non-malicious data makes training more robust against poisoned examples—provided that these poisoned examples are small in number. One way to do this is through data augmentation—the creation of artificial training set samples that are small variations of existing samples. The goal is to “outnumber” the poisoned samples so the model “forgets” them. Note that this mitigation can only be applied during training, and therefore does not apply to an already trained model. [28]
    • Data quality control: Perform quality control on data including detecting poisoned samples through integrity checks, statistical deviation, or pattern recognition. Proactively implement data quality controls during the training phase to prevent issues before they arise in production.

    Risk: Data duplications

    Unintended duplicate data elements [7] in training datasets can skew model performance and cause overfitting, reducing the AI model’s ability to generalize across a variety of real-world applications. Duplicates are not always exact; near-duplicates may contain minor differences like formatting, abbreviations, or errors, which makes detecting them more complex. Duplicate data often leads to inaccurate predictions, making the AI system less effective in real-world applications.

    Mitigation strategies:

    • Data deduplication: Implement deduplication techniques (such as fuzzy matching, hashing, clustering, etc.) to carefully identify and handle duplicates and near-duplicates in the data.

    Data drift – risks and mitigations

    Relevant AI Lifecycle stages: 5) Deploy & Use; 6) Operate & Monitor

    Data drift, or distribution shift, refers to changes in the underlying statistical properties of the input data to an operational AI system. Over time, the input data can become significantly different from the data originally used to train the model. [7],[8] Degradation caused by data drift is a natural and expected occurrence, and AI system developers and operators need to regularly update models to maintain accuracy and performance. Data drift ordinarily begins as small, seemingly insignificant degradations in model performance. Left unchecked, the degradation caused by data drift can snowball into substantial reductions in AI system accuracy and integrity that become increasingly difficult to correct. 

    It is crucial to distinguish between data drift and data poisoning attacks designed to affect an AI model. Continuous monitoring of system accuracy and performance provides important indicators based on the nature of the changes observed. If the changes are slow and gradual over time, it is more likely that the model is experiencing data drift. If the changes are abrupt and dramatic in one or more dimensions, it is more likely that an actor is trying to compromise the model. Cyber compromises often aim to manipulate the model’s performance quickly and significantly, leading to abrupt changes in the input data or model outputs.

    AI system operators and developers should employ a wide range of techniques for detecting and mitigating data drift, including data preprocessing, increasing dataset coverage of real-world scenarios, and adopting robust training and adaptation strategies. [30] Packages that automate dataset loading assist AI system developers in creating application-specific detection and mitigation techniques for data drift.

    There are many potential causes of data drift, including: 

    1. A change in the upstream data pipeline not represented in the model training data (e.g., the units of a particular data element change from miles to kilometers)
    2. The introduction of completely new data elements that the model had not previously seen (e.g., a new type of malware not recognized in the ML layer of an anti-virus product)
    3. A change in the context of how inputs and outputs are related (e.g., a change in organizational structure due to a merger or acquisition could lead to new data access patterns that might be misinterpreted as security threats by an AI system)

    The data associated with a given AI model should be regularly checked for any updates to help ensure the model still predicts as expected. [7],[8],[9] The interval for this update and check will depend on the particular AI system and application. For example, in high-stakes applications such as healthcare, early detection and mitigation of data drift are critical prior to patient impact. Thus, continuous monitoring of model performance with additional direct analysis of the input data is important in such applications. [30] 

    Mitigation strategies:

    • Data management: Employ a data management strategy in keeping with the best practices in this CSI to help ensure that it is easy to add and track new data elements for model training and adaptation. This management strategy enables identification of data elements causing drift for appropriate mitigation or action.
    • Data-quality testing: AI system developers should use data-quality assessment tools to assist in selecting and filtering data used for model training or adaptation. Understanding the current dataset and its impact on model behavior is critical to detecting data drift.
    • Input and output monitoring: Monitor the AI system inputs and outputs to verify the model is performing as expected. [9] Regularly update your model using current data. Utilize meaningful statistical methods that measure expected dataset metrics and compare the distribution of the training data to the test data to help determine if data drift is occurring. [7] 

    Data management tools and methods are currently an active area of research. However, data drift can be mitigated by incorporating application-specific data management protocols that include: continuous monitoring, retraining (regularly incorporating the latest data into the models), data cleansing (correcting errors or inconsistencies in the data), and using ensemble models (combining predictions of multiple models). Incorporation of a data management framework into the design of AI systems from the beginning is essential for improving the overall integrity and security posture. [31]

    Conclusion

    Data security is of paramount importance when developing and operating AI systems. As organizations in various sectors rely more and more on AI-driven outcomes, data security becomes crucial for maintaining accuracy, reliability, and integrity. The guidance provided in this CSI outlines a robust approach to securing AI data and addressing the risks associated with the data supply chain, malicious data, and data drift.

    Data security is an ever-evolving field, and continuous vigilance and adaptation are key to staying ahead of emerging threats and vulnerabilities. The best practices presented here encourage the highest standards of data security in AI while helping ensure the accuracy and integrity of AI-driven outcomes. By adopting these best practices and risk mitigation strategies, organizations can fortify their AI systems against potential threats and safeguard sensitive, proprietary, and mission critical data used in the development and operation of their AI systems. 

    References

    1 In this document, Artificial Intelligence (AI) has the meaning set forth in 15 U.S.C. 9401(3): 
    “… a machine-based system that can, for a given set of human-defined objectives, make predictions, recommendations, or decisions influencing real or virtual environments. AI systems use machine- and human-based inputs to:
      (A) Perceive real and virtual environments;
      (B) Take these perceptions and turn them into models through analysis in an automated manner; and
      (C) Use model inference to formulate options for information or action.”

    2 Data integrity is defined by the IC Data Management Lexicon [1] as “The degree to which data can be trusted due to its provenance, pedigree, lineage and conformance with all business rules regarding its relationship with other data. In the context of data movement, this is the degree to which data has verifiably not been changed unexpectedly by a person or NPE.”

    3 The term data consumers is defined as technical personnel (e.g. data scientists, engineers) who make use of data that they themselves did not produce or annotate to build and/or operate AI systems. 

    4 Model inversion refers to the process by which an attacker analyzes the output patterns of an AI system to reverse-engineer and uncover details about the training dataset, such as individual data points or patterns. This process can potentially expose confidential or proprietary information from the data that was used to train the AI models.

    5 “A data statement is a characterization of a dataset that provides context to allow developers and users to better understand how experimental results might generalize, how software might be appropriately deployed, and what biases might be reflected in systems built on the software.” [23] 

    6 “In technical systems, bias is most commonly understood and treated as a statistical phenomenon. Bias is an effect that deprives a statistical result of representativeness by systematically distorting it, as distinct from random error, which may distort on any one occasion but balances out on the average.” [26],[32] 

    Works cited

    [1] Office of the Director of National Intelligence. The Intelligence Community Data Management Lexicon. 2024. https://dni.gov/files/ODNI/documents/IC_Data_Management_Lexicon.pdf   
    [2] National Security Agency et al. Deploying AI Systems Securely: Best Practices for Deploying Secure and Resilient AI Systems. 2024. https://media.defense.gov/2024/Apr/15/2003439257/-1/-1/0/CSI-DEPLOYING-AI-SYSTEMS-SECURELY.PDF  
    [3] National Institute of Standards and Technology (NIST). NIST AI 100-1: Artificial Intelligence Risk Management Framework (AI RMF 1.0). 2023. https://doi.org/10.6028/NIST.AI.100-1  
    [4] NIST. NIST Special Publication 800-37 Rev. 2: Guide for Applying the Risk Management Framework to Federal Information Systems. 2018. https://doi.org/10.6028/NIST.SP.800-37r2  
    [5] NIST. Federal Information Processing Standards Publication (FIPS) 204: Module-Lattice-Based Digital Signature Standard. 2024. https://doi.org/10.6028/NIST.FIPS.204  
    [6] NIST. FIPS 205: Stateless Hash-Based Digital Signature Standard. 2024. https://doi.org/10.6028/NIST.FIPS.205  
    [7] Bommasani, R. et al. On the Opportunities and Risks of Foundation Models. arXiv:2108.07258v3. 2022. https://arxiv.org/abs/2108.07258v3  
    [8] Securing Artificial Intelligence (SAI); Data Supply Chain Security. ESTI GR SAI 002 V1.1.1. 2021. https://etsi.org/deliver/etsi_gr/SAI/001_099/002/01.01.01_60/gr_SAI002v010101p.pdf  
    [9] National Cyber Security Centre et al. Guidelines for Secure AI System Development. 2023. https://www.ncsc.gov.uk/files/Guidelines-for-secure-AI-system-development.pdf  
    [10] NIST. NIST Special Publication 800-207: Zero Trust Architecture. 2020. https://doi.org/10.6028/NIST.SP.800-207  
    [11] NIST. NIST IR 8496 ipd: Data Classification Concepts and Considerations for Improving Data Protection. 2023. https://doi.org/10.6028/NIST.IR.8496.ipd  
    [12] Cybersecurity and Infrastructure Security Agency (CISA), NSA, and NIST. Quantum-Readiness: Migration to Post-Quantum Cryptography. 2023. https://www.cisa.gov/resources-tools/resources/quantum-readiness-migration-post-quantum-cryptography 
    [13] NIST. FIPS 203: Module-Lattice-Based Key-Encapsulation Mechanism Standard. 2024. https://doi.org/10.6028/NIST.FIPS.203  
    [14] NIST. NIST SP 800-52 Rev. 2: Guidelines for the Selection, Configuration, and Use of Transport Layer Security (TLS) Implementations. 2019. https://doi.org/10.6028/NIST.SP.800-52r2  
    [15] NIST. FIPS 140-3, Security Requirements for Cryptographic Modules. 2019. https://doi.org/10.6028/NIST.FIPS.140-3    
    [16] NIST. FIPS 140-2, Security Requirements for Cryptographic Modules. 2001. https://doi.org/10.6028/NIST.FIPS.140-2  
    [17] NIST. NIST AI 100-2e2023: Trustworthy and Responsible AI, Adversarial Machine Learning: A Taxonomy and Terminology of Attacks and Mitigations. 2024. https://doi.org/10.6028/NIST.AI.100-2e2023  
    [18] Adak, M. F., Kose, Z. N., & Akpinar, M. Dynamic Data Masking by Two-Step Encryption. In 2023 Innovations in Intelligent Systems and Applications Conference (ASYU) (pp. 1-5). IEEE. 2023 https://doi.org/10.1109/ASYU58738.2023.10296545    
    [19] Kairouz, P. et al. Advances and Open Problems in Federated Learning. Foundations and Trends in Machine Learning 14 (1-2): 1-210. arXiv:1912.04977. 2021. https://arxiv.org/abs/1912.04977  
    [20] NIST. NIST SP 800-88 Rev. 1: Guidelines for Media Sanitization. 2014. https://doi.org/10.6028/NIST.SP.800-88r1  
    [21] NIST. NIST Special Publication 800-3 Rev. 2: Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy. 2018. https://doi.org/10.6028/NIST.SP.800-37r2  
    [22] U.S. Department of Homeland Security. Preparedness Series June 2023: Risks and Mitigation Strategies for Adversarial Artificial Intelligence Threats: A DHS S&T Study. 2023. https://www.dhs.gov/sites/default/files/2023-12/23_1222_st_risks_mitigation_strategies.pdf  
    [23] Bender, E. M., & Friedman, B. Data Statements for Natural Language Processing: Toward Mitigating System Bias and Enabling Better Science. Transactions of the Association for Computational Linguistics (TACL) 6, 587–604. 2018. https://doi.org/10.1162/tacl_a_00041  
    [24] NSA et al. Content Credentials: Strengthening Multimedia Integrity in the Generative AI Era. 2025. https://media.defense.gov/2025/Jan/29/2003634788/-1/-1/0/CSI-CONTENT-CREDENTIALS.PDF  
    [25] Executive Order (EO) 14179: “Removing Barriers to American Leadership in Artificial Intelligence” https://www.federalregister.gov/executive-order/14179   
    [26] NIST. NIST Special Publication 1270: Framework for Identifying and Managing Bias in Artificial Intelligence. 2023. https://doi.org/10.6028/NIST.SP.1270  
    [27] NIST. NIST AI 600-1: Artificial Intelligence Risk Management Framework: Generative Artificial Intelligence Profile. 2023. https://doi.org/10.6028/NIST.AI.600-1  
    [28] Open Web Application Security Project (OWASP). AI Exchange. #Moretraindata. https://owaspai.org/goto/moretraindata/  
    [29] Carlini, N. et al. Poisoning Web-Scale Training Datasets is Practical. arXiv:2302.10149. 2023. https://arxiv.org/abs/2302.10149  
    [30] Kore, A., Abbasi Bavil, E., Subasri, V., Abdalla, M., Fine, B., Dolatabadi, E., & Abdalla, M. Empirical Data Drift Detection Experiments on Real-World Medical Image Data. Nature Communications 15, 1887. 2024. https://doi.org/10.1038/s41467-024-46142-w  
    [31] NIST. NIST Special Publication 800-208: Recommendation for Stateful Hash-Based Signature Schemes. 2020. https://doi.org/10.6028/NIST.SP.800-208  
    [32] The Organisation for Economic Cooperation and Development (OECD). Glossary of statistical terms. 2008. https://doi.org/10.1787/9789264055087-en  
    [33] NIST. NIST SP 800-53 Rev. 5: Security and Privacy Controls for Information Systems and Organizations. 2020. https://doi.org/10.6028/NIST.SP.800-53r5 
    [34] OWASP. AI Exchange. How to select relevant threats and controls? risk analysis. https://owaspai.org/goto/riskanalysis/  

    Disclaimer of Endorsement

    The information and opinions contained in this document are provided “as is” and without any warranties or guarantees. Reference herein to any specific commercial products, process, or service by trade name, trademark, manufacturer, or otherwise, does not constitute or imply its endorsement, recommendation, or favoring by the United States Government, and this guidance shall not be used for advertising or product endorsement purposes.

    Purpose

    This document was developed in furtherance of the authoring organizations’ cybersecurity missions, including their responsibilities to identify and disseminate threats, and to develop and issue cybersecurity specifications and mitigations. This information may be shared broadly to reach all appropriate stakeholders. 

    Notice of Generative AI Use

    Generative AI technology was carefully and responsibly used in the development of this document. The authors maintain ultimate responsibility for the accuracy of the information provided herein.

    Contact 

    U.S. Organizations

    National Security Agency

    Australian organizations

    • Visit cyber.gov.au/report or call 1300 292 371 (1300 CYBER1) to report cybersecurity incidents and vulnerabilities.

    New Zealand organizations

    MIL OSI USA News –

    May 27, 2025
  • MIL-OSI: Intchains Group Limited Reports First Quarter 2025 Unaudited Financial Results

    Source: GlobeNewswire (MIL-OSI)

    Total revenues of US$18.2 million exceeds guidance, up 445.5% YoY

    Total ETH-based cryptocurrency units were approximately 7,023, up 23.2% QoQ

    Income from operations reach US$5.1 million, achieving turnaround from prior-year period

    SINGAPORE, May 22, 2025 (GLOBE NEWSWIRE) — Intchains Group Limited (Nasdaq: ICG) (“we,” or the “Company”), a company that engages in the provision of altcoin mining products, the strategic acquisition and holding of Ethereum-based cryptocurrencies, and the active development of innovative Web3 applications, today announced its unaudited financial results for the first quarter ended March 31, 2025.

    First Quarter 2025 Operating and Financial Highlights

    • Sales Volume of Altcoin Mining Products Measured by Number of Embedded ASIC Chips: Since we offer a wide range of altcoin mining products, with each unit incorporating anywhere from tens to hundreds of ASIC chips, it is more meaningful to measure the sales of our altcoin mining products by the number of embedded ASIC chips. Our sales volume of ASIC chips for Q1 2025 was 709,857 units, compared to 494,235 units for the same period last year, representing an increase of 43.6%.
    • Revenue: Our revenue for Q1 2025 reached RMB132.4 million (US$18.2 million), reflecting a increase of 445.5% from RMB24.3 million for the same period of 2024.
    • Income/(Loss) from Operations: We recorded income from operations of RMB36.9 million (US$5.1 million) for Q1 2025, compared to a loss from operations of RMB34.6 million for the same period of 2024.
    • Net Loss: Our net loss for Q1 2025 was RMB34.0 million (US$4.7 million), reflecting an increase of 129.8% from RMB14.8 million for the same period in 2024.
    • Non-GAAP Adjusted Net Loss: Non-GAAP adjusted net loss in the first quarter of 2025 was RMB32.0 million (US$4.4 million), reflecting an increase of 139.6% from RMB13.3 million for the same period in 2024. Non-GAAP adjusted net loss excludes share-based compensation expenses. For further information, please refer to “Use of Non-GAAP Financial Measures” in this press release.
    • Cryptocurrencies: As of March 31, 2024, the fair value of our cryptocurrency assets other than stablecoins such as USDT and USDC was RMB101.6 million (US$14.0 million), primarily comprised of approximately 7,023 ETH-based cryptocurrencies, valued at RMB93.7 million (US$13.1 million).

    Intchains Group Achieves Milestones in Innovative Solutions and Cryptocurrency Strategy

    Mr. Qiang Ding, Chairman of the Board of Directors and Chief Executive Officer, commented, “In the first quarter of 2025, the cryptocurrency market encountered considerable headwinds. Nevertheless, the Company demonstrated agility and foresight by promptly launching the Aleo series mining machines in response to shifting market dynamics. These altcoin mining machines delivered substantial profitability for miners amid challenging macro market conditions while driving sustainable corporate growth –further validating our expertise in altcoin mining machine innovations and our competitive edge through differentiated market positioning.

    In addition, the Company introduced Goldshell Byte, an innovative dual-mining machine. This milestone reflects the Company’s unique capability to design and manufacture advanced mining machines spanning multiple altcoin protocols. The modular design—featuring a standard miner with pluggable mining cards—offers strategic flexibility for miners and encourages wider participation by retail users. Its compact, home-friendly form factor further promotes widespread participation in the decentralized network.

    During the quarter, small- and mid-cap cryptocurrencies, including Ethereum, experienced downward pressure. Despite this, the Company remained committed to its long-term dollar-cost averaging strategy. As of March 31, 2025, the Company held approximately 7,023 ETH, representing a 23.2% increase quarter-over-quarter.

    In the second quarter of 2025, Ethereum completed its Pectra upgrade, and the Ethereum Foundation reaffirmed its long-term vision with the appointment of a new board of directors. The Company views these developments as positive signals and continues to believe in the enduring value of blockchain technology. As a long-term accumulator of Ethereum, the Company will continue to build its position in alignment with its strategic outlook on decentralized applications.”

    First Quarter 2025 Financial Results

    Revenue

    Revenue was RMB132.4 million (US$18.2 million) for the first quarter of 2025, representing an increase of 445.5% from RMB24.3 million for the same period in 2024. The substantial growth was primarily driven by strong market demand for our newly-launched Aleo series mining machines, which accounted for 74.8% of the total revenue for the first quarter of 2025.

    Cost of Revenue

    Cost of revenue was RMB57.0 million (US$7.9 million) for the first quarter of 2025, representing an increase of 273.8% from RMB15.3 million for the same period of 2024. The percentage increase in cost of revenue was lower than the percentage increase in our revenue, which was primarily due to the higher gross margins for the Aleo series mining machines sold in the first quarter of 2025.

    Operating Expenses

    Total operating expenses were RMB38.4 million (US$5.3 million) for the first quarter of 2025, representing a decrease of 11.8% from RMB43.6 million for the same period of 2024. The decrease was primarily due to a decrease in research and development expenses, partially offset by an increase of general and administrative expenses.

    • Research and development expenses decreased by 27.9% to RMB26.4 million (US$3.6 million) for the first quarter of 2025 from RMB36.5 million for the same period of 2024. The decrease was primarily due to lower expenses related to preliminary research costs conducted for new projects.
    • Sales and marketing expenses increased by 37.8% to RMB2.2 million (US$0.3 million) for the first quarter of 2025 from RMB1.6 million for the same period of 2024, mainly driven by increased personnel-related expenses.
    • General and administrative expenses increased by 81.8% to RMB9.8 million (US$1.4 million) for the first quarter of 2025 from RMB5.4 million for the same period of 2024, mainly driven by increased professional fees, as well as the personnel-related expenses.

    Interest Income

    Interest income decreased by 24.0% to RMB3.2 million (US$0.4 million) for the first quarter of 2025 from RMB4.2 million for the same period of 2024, mainly due to a lower cash level resulting from our strategy of allocating part of our operating cash flow to acquire ETH-based cryptocurrencies.

    Change in fair value of cryptocurrencies

    Change in fair value of cryptocurrencies was RMB70.8 million (US$9.8 million) loss for the first quarter of 2025, compared to RMB5.4 million gain for the same period of 2024. The loss was primarily due to an approximately 46.0% decline in the price of ETH, while we simultaneously increased our holdings of ETH-based cryptocurrency as part of our ongoing ETH accumulation strategy.

    Other Income, Net

    Other income, net remained steady at RMB0.1 million and RMB0.2 million (US$0.03 million), respectively, for the first quarter of 2024 and 2025.

    Net Loss

    As a result of the foregoing, our net loss increased by 129.8% to RMB34.0 million (US$4.7 million) for the first quarter of 2025 from RMB14.8 million for the same period of 2024.

    Non-GAAP Adjusted Net Loss

    Non-GAAP adjusted net loss increased by 139.6% to RMB32.0 million (US$4.4 million) for the first quarter of 2025 from RMB13.3 million for the same period of 2024.

    Basic and Diluted Net Loss Per Ordinary Share

    Basic and diluted net loss per ordinary share both increased by 133.3% to RMB0.28 (US$0.04) for the first quarter of 2025 from RMB0.12 for the same period of 2024.

    Non-GAAP Basic and Diluted Net Loss Per Ordinary Share

    Non-GAAP adjusted basic and diluted net loss per ordinary share increased by 145.5% to RMB0.27 (US$0.04) for the first quarter of 2025 from RMB0.11 for the same period of 2024. Each ADS represents two of the Company’s Class A ordinary shares.

    Recent Development

    Aleo Mining: In the first quarter of 2025, we led the market with the launch of our Aleo series mining machines, which were well-received by the crypto mining communities globally despite sustained macro market pressures. By the end of May 2025, we had released five key models of the Aleo series, which have demonstrated strong competitiveness in the PoW sector in terms of daily profitability.

    Goldshell Byte: On March 26, 2025, we officially launched Goldshell Byte, our latest flagship product, and an innovative dual-mining machine. Designed to allow miners to dynamically respond to market changes, Goldshell Byte combines standardized hardware with modular pluggable cards, drawing upon the our deep and extensive experience across multiple altcoin ecosystems. This innovation is expected to further strengthen our market position in the altcoin mining space.

    Conference Call Information

    The Company’s management team will host an earnings conference call to discuss its financial results at 8:00 PM U.S. Eastern Time on May 22, 2025 (8:00 AM Beijing Time on May 23, 2025). Details for the conference call are as follows:

    Event Title: Intchains Group Limited First Quarter 2025 Earnings Conference Call

    Date: May 22, 2025

    Time: 8:00 PM U.S. Eastern Time

    Registration Link: https://register-conf.media-server.com/register/BI0dda68e5b19a4a7daade5ed1cf188ed8

    All participants must use the link provided above to complete the online registration process in advance of the conference call. Upon registering, each participant will receive a set of dial-in numbers and a personal access PIN, which will be used to join the conference call.

    Additionally, a live and archived webcast of the conference call will also be available at the Company’s website at https://ir.intchains.com/.

    About Intchains Group Limited

    Intchains Group Limited is a company that engages in the provision of altcoin mining products, the strategic acquisition and holding of Ethereum-based cryptocurrencies, and the active development of innovative Web3 applications. For more information, please visit the Company’s website at: https://intchains.com/.

    Exchange Rate Information

    The unaudited United States dollar (“US$”) amounts disclosed in the accompanying financial statements are presented solely for the convenience of the readers. Translations of amounts from RMB into US$ for the convenience of the reader were calculated at the noon buying rate of US$1.00=RMB7.2567 on the last trading day of the first quarter of 2025 (March 31, 2025). No representation is made that the RMB amounts could have been, or could be, converted into US$ at such rate.

    Forward-Looking Statements

    Certain statements in this announcement are forward-looking statements. These forward-looking statements involve known and unknown risks and uncertainties and are based on the Company’s current expectations and projections about future events that the Company believes may affect its financial condition, results of operations, business strategy and financial needs. Forward-looking statements include, but are not limited to, statements about: (i) our goals and strategies; (ii) our future business development, formed condition and results of operations; (iii) expected changes in our revenue, costs or expenditures; (iv) growth of and competition trends in our industry; (v) our expectations regarding demand for, and market acceptance of, our products; (vi) general economic and business conditions in the markets in which we operate; (vii) relevant government policies and regulations relating to our business and industry; (viii) fluctuations in the market price of ETH-based cryptocurrencies; gains or losses from the sale of ETH-based cryptocurrencies; changes in accounting treatment for the Company’s ETH-based cryptocurrencies holdings; a decrease in liquidity in the markets in which ETH-based cryptocurrencies are traded; security breaches, cyberattacks, unauthorized access, loss of private keys, fraud, or other events leading to the loss of the Company’s ETH-based cryptocurrencies; impacts to the price and rate of adoption of ETH-based cryptocurrencies associated with financial difficulties and bankruptcies of various participants in the industry; and (viii) assumptions underlying or related to any of the foregoing. Investors can identify these forward-looking statements by words or phrases such as “may,” “could,” “will,” “should,” “would,” “expect,” “plan,” “intend,” “anticipate,” “believe,” “estimate,” “predict,” “potential,” “project” or “continue” or the negative of these terms or other comparable terminology. The Company undertakes no obligation to update or revise publicly any forward-looking statements to reflect subsequent occurring events or circumstances, or changes in its expectations, except as may be required by law. Although the Company believes that the expectations expressed in these forward-looking statements are reasonable, it cannot assure you that such expectations will turn out to be correct, and the Company cautions investors that actual results may differ materially from the anticipated results and encourages investors to review other factors that may affect its future results in the Company’s registration statement and other filings with the SEC.

    Use of Non-GAAP Financial Measures

    In evaluating Company’s business, the Company uses non-GAAP measures, such as adjusted income (loss) from operations and adjusted net income (loss), as supplemental measures to review and assess its operating performance. The Company defines adjusted income (loss) from operations as income (loss) from operations excluding share-based compensation expenses, and adjusted net income (loss) as net income (loss) excluding share-based compensation expenses. The Company believes that the non-GAAP financial measures provide useful information about the Company’s results of operations, enhance the overall understanding of the Company’s past performance and future prospects and allow for greater visibility with respect to key metrics used by the Company’s management in its financial and operational decision-making.

    The non-GAAP financial measures are not defined under U.S. GAAP and are not presented in accordance with U.S. GAAP. The non-GAAP financial measures have limitations as analytical tools and investors should not consider them in isolation, or as a substitute for net income, cash flows provided by operating activities or other consolidated statements of operations and cash flows data prepared in accordance with U.S. GAAP. One of the key limitations of using adjusted net income is that it does not reflect all of the items of income and expense that affect the Company’s operations. Share based compensation expenses have been and may continue to be incurred in Company’s business and are not reflected in the presentation of adjusted net income. Further, the non-GAAP financial measures may differ from the non-GAAP information used by other companies, including peer companies, and therefore their comparability may be limited. The Company mitigates these limitations by reconciling the non-GAAP financial measures to the most comparable U.S. GAAP performance measures, all of which should be considered when evaluating the Company’s performance.

    For investor and media inquiries, please contact:

    Intchains Group Limited
    Investor relations
    Email: ir@intchains.com

    Redhill
    Belinda Chan
    Tel: +852-9379-3045
    Email: belinda.chan@creativegp.com

    INTCHAINS GROUP LIMITED
    UNAUDITED CONDENSED CONSOLIDATED BALANCE SHEETS
    (All amounts in thousands, except share and per share data, or as otherwise noted)

      As of December 31,   As of March 31
      2024    2025
      RMB   RMB US$
    ASSETS        
    Current Assets:        
    Cash and cash equivalents 322,252     243,316   33,530
    USDC 1,690     3,458   476
    Cryptocurrency, current 30,079     11,674   1,609
    Inventories, net 98,614     92,494   12,746
    Prepayments and other current assets, net 69,703     67,857   9,351
    Short-term investments 198,562     300,530   41,414
    Total current assets 720,900     719,329   99,126
    Non-current Assets:        
    Cryptocurrencies, non-current 148,790     101,566   13,996
    Long-term investments 20,569     21,913   3,020
    Property, equipment, and software, net 157,065     155,934   21,489
    Intangible assets, net 3,552     3,424   472
    Right-of-use assets 272     —   —
    Deferred tax assets 28,942     26,173   3,607
    Other non-current assets 9,419     9,712   1,338
    Total non-current assets 368,609     318,722   43,922
    Total assets 1,089,509     1,038,051   143,048
    LIABILITIES, AND SHAREHOLDERS’ EQUITY        
    Current Liabilities:        
    Accounts payable 14,847     5,191   715
    Contract liabilities 37,447     28,866   3,979
    Income tax payable 2,023     1,241   171
    Lease liabilities 272     —   —
    Provision for warranty 161     241   33
    Accrued liabilities and other current liabilities 21,692     17,367   2,393
    Total current liabilities 76,442     52,906   7,291
    Total liabilities 76,442     52,906   7,291
    Shareholders’ Equity:        
    Ordinary shares (US$0.000001 par value; 50,000,000,000 shares authorized, 120,081,456 and 120,803,478 shares issued, 120,020,962 and 120,742,984 shares outstanding as of December 31, 2024 and March 31, 2025, respectively) 1     1   —
    Subscriptions receivable from shareholders (1 )   (1 ) —
    Additional paid-in capital 195,236     201,629   27,785
    Statutory reserves 51,762     51,912   7,154
    Accumulated other comprehensive income 3,777     3,459   477
    Retained earnings 762,292     728,145   100,341
    Total shareholders’ equity 1,013,067     985,145   135,757
    Total liabilities and shareholders’ equity 1,089,509     1,038,051   143,048
    INTCHAINS GROUP LIMITED
    UNAUDITED CONDENSED CONSOLIDATED STATEMENTS OF OPERATIONS AND COMPREHENSIVE LOSS
    (All amounts in thousands, except share and per share data, or as otherwise noted)
      For the Three Months ended March 31,  
      2024    2025  
      RMB   RMB US$  
    Products revenue 24,271     132,391   18,244  
    Cost of revenue (15,262 )   (57,045 ) (7,861 )
    Gross profit 9,009     75,346   10,383  
    Operating expenses:        
    Research and development expenses (36,540 )   (26,354 ) (3,632 )
    Sales and marketing expenses (1,623 )   (2,237 ) (308 )
    General and administrative expenses (5,410 )   (9,838 ) (1,356 )
    Total operating expenses (43,573 )   (38,429 ) (5,296 )
    Income/(Loss) from operations (34,564 )   36,917   5,087  
    Interest income 4,150     3,154   435  
    Foreign exchange loss, net (254 )   (179 ) (25 )
    Change in fair value of cryptocurrencies 5,442     (70,814 ) (9,758 )
    Other income, net 139     193   27  
    Loss before income tax expenses (25,087 )   (30,729 ) (4,234 )
    Income tax (expense)/benefit 10,292     (3,268 ) (450 )
    Net loss (14,795 )   (33,997 ) (4,684 )
    Foreign currency translation adjustment, net of nil tax 108     (318 ) (44 )
    Total comprehensive loss (14,687 )   (34,315 ) (4,728 )
             
    Weighted average number of shares used in per share calculation        
    — Basic 119,888,044     120,053,052   120,053,052  
    — Diluted 119,888,044     120,053,052   120,053,052  
    Net loss per share        
    — Basic (0.12 )   (0.28 ) (0.04 )
    — Diluted (0.12 )   (0.28 ) (0.04 )
    INTCHAINS GROUP LIMITED
    RECONCILIATIONS OF GAAP AND NON-GAAP RESULTS
    (All amounts in thousands, except per share data)
      For the Three Months ended March 31,
      2024   2025
      RMB   RMB US$
    Income/(Loss) from operations (34,564 )   36,917   5,087  
    Add:        
    Share-based compensation expense 1,452     2,022   279  
    Non-GAAP adjusted operating income/(loss) (33,112 )   38,939   5,366  
    Net loss (14,795 )   (33,997 ) (4,684 )
    Add:        
    Share-based compensation expense 1,452     2,022   279  
    Non-GAAP adjusted net loss (13,343 )   (31,975 ) (4,405 )
             
    Non-GAAP adjusted net loss per share        
    — Basic (0.11 )   (0.27 ) (0.04 )
    — Diluted (0.11 )   (0.27 ) (0.04 )
    INTCHAINS GROUP LIMITED
    UNAUDITED CRYPTOCURRENCY-ADDITIONAL INFORMATION
     
    As of Quarter Ended Cryptocurrency Approximate
    Number of
    Cryptocurrency
    Held at End of
    Quarter
    Original Cost
    Basis
    Approximate
    Average Cost
    Price Per Unit
    of
    Cryptocurrency
    Lowest Market
    Price Per Unit of
    Cryptocurrency
    During Quarter
    (a)
    Market Value of
    Cryptocurrency
    Held at End of
    Quarter Using
    Lowest Market
    Price (b)
    Highest Market
    Price Per Unit of
    Cryptocurrency
    During Quarter
    (c)
    Market Value of
    Cryptocurrency
    Held at End of
    Quarter Using
    Highest Market
    Price (d)
    Market Price
    Per Unit of
    Cryptocurrency at End of Quarter
    (e)
    Market Value of
    Cryptocurrency
    Held at End of
    Quarter Using
    Ending Market
    Price (f)
        Unit USD USD USD USD USD USD USD USD
    March 31, 2025 ETH 6,347 18,031,664 2,841 1,754 11,132,638 3,746 23,775,862 1,842 11,691,174
    ETH-Coinbase Staked 676 1,954,713 2,892 1,914 1,293,864 4,065 2,747,940 2,017 1,363,492
    Bitcoin 12.66 946,882 74,793 76,555 969,186 109,358 1,384,472 83,416 1,056,047
    USDT&USDC 2,108,065 2,111,681 1 1 2,091,378 1 2,124,947 1 2,107,951
    Others Multiple * 84,283 Multiple * Multiple * 33,817 Multiple * 94,121 Multiple * 37,553
      Total   23,129,223     15,520,883   30,127,342   16,256,217
                         
    December 31, 2024 ETH 5,075 15,102,524 2,976 2,309 11,718,175 4,109 20,853,175 3,414 17,326,050
    ETH-Coinbase Staked 627 1,800,713 2,872 2,487 1,559,349 4,450 2,790,150 3,701 2,320,527
    Bitcoin 10.29 720,567 70,026 58,864 605,711 108,389 1,115,323 95,285 980,483
    USDT&USDC 4,425,484 4,428,159 1 1 4,384,335 1 4,469,357 1 4,419,574
    Others Multiple * 78,298 Multiple * Multiple * 30,694 Multiple * 101,589 Multiple * 69,389
      Total   22,130,261     18,298,264   29,329,594   25,116,023
                         
    September 30, 2024 ETH 3,522 10,115,116 2,872 2,116 7,452,552 3,563 12,548,886 2,596 9,143,112
    ETH-Coinbase Staked 627 1,800,713 2,872 2,290 1,435,830 3,926 2,461,602 2,807 1,759,989
    Bitcoin 8.47 549,364 64,860 49,050 415,454 70,000 592,900 63,552 538,285
    USDT&USDC 9,847,687 9,849,266 1 1 9,814,682 1 9,857,395 1 9,845,929
    Others Multiple * 105,405 Multiple * Multiple * 36,415 Multiple * 72,441 Multiple * 53,661
      Total   22,419,864     19,154,933   25,533,224   21,340,976
                         
    June 30, 2024 ETH 1,937 6,179,744 3,190 2,814 5,450,718 3,974 7,697,638 3,394 6,574,178
    ETH-Coinbase Staked 480 1,301,108 2,711 2,954 1,417,920 4,243 2,036,640 3,645 1,749,600
    Bitcoin 3.95 265,883 67,312 56,500 223,175 72,777 287,469 61,613 243,371
    USDT&USDC 10,422,648 10,423,276 1 1 10,386,315 1 10,458,980 1 10,404,063
    Others Multiple * 107,484 Multiple * Multiple * 54,226 Multiple * 122,435 Multiple * 64,202
    Total   18,277,495     17,532,354   20,603,162   19,035,414
                         
    March 31,2024 ETH 346 999,180 2,888 2,100 726,600 4,094 1,416,524 3,618 1,251,828
    ETH-Coinbase Staked 479 1,297,687 2,709 2,236 1,071,044 4,341 2,079,339 3,842 1,840,318
    Bitcoin 0.67 44,995 67,157 38,501 25,796 73,836 49,470 70,407 47,173
    USDT&USDC 99,583 99,583 1 1 99,583 1 99,583 1 99,583
    Others Multiple * 81,571 Multiple * Multiple * 67,814 Multiple * 124,481 Multiple * 91,346
    Total   2,523,016     1,990,837   3,769,397   3,330,248

    * The ‘Others’ category encompasses various cryptocurrencies that are not reported individually due to their lower significance. This category is labeled as ‘Multiple’ to indicate the presence of diverse prices associated with different type of cryptocurrency. Due to their immaterial nature, detailed price listings are not provided.
    (a) The “Lowest Market Price Per Unit of Cryptocurrency During Quarter” represents the lowest market price for a single unit of cryptocurrency reported on the Coinbase exchange during the respective quarter, without regard to when we obtained any of the cryptocurrency.
    (b) The “Market Value of Cryptocurrency Held at End of Quarter Using Lowest Market Price” represents a mathematical calculation consisting of the lowest market price for a single unit of cryptocurrency reported on the Coinbase exchange during the respective quarter multiplied by the number of cryptocurrency we held at the end of the applicable period.
    (c) The “Highest Market Price Per Unit of Cryptocurrency During Quarter” represents the highest market price for a single unit of cryptocurrency reported on the Coinbase exchange during the respective quarter, without regard to when we obtained any of the cryptocurrency.
    (d) The “Market Value of Cryptocurrency Held at End of Quarter Using Highest Market Price” represents a mathematical calculation consisting of the highest market price for a single unit of cryptocurrency reported on the Coinbase exchange during the respective quarter multiplied by the number of cryptocurrency we held at the end of the applicable period.
    (e) The “Market Price Per Unit of Cryptocurrency at End of Quarter” represents the market price of a single unit of cryptocurrency on the Coinbase exchange at midnight UTC+8 time on the last day of the respective quarter, which aligns with our revenue recognition cut-off.
    (f) The “Market Value of Cryptocurrency Held at End of Quarter Using Ending Market Price” represents a mathematical calculation consisting of the market price of a single unit of cryptocurrency on the Coinbase exchange at midnight UTC+8 time on the last day of the respective quarter multiplied by the number of cryptocurrency we held at the end of the applicable period.

    The MIL Network –

    May 27, 2025
  • MIL-OSI Russia: China’s Vice Chairman Calls for Promoting Transformation of Global Trade and Investment

    Translation. Region: Russian Federal

    Source: People’s Republic of China in Russian – People’s Republic of China in Russian –

    Source: People’s Republic of China – State Council News

    BEIJING, May 22 (Xinhua) — Chinese Vice President Han Zheng on Thursday called for joint efforts to promote the transformation of global trade and investment in the digital and intelligent era.

    Han Zheng made the announcement while speaking at the opening ceremony of the 2025 Global Trade and Investment Facilitation Summit in Beijing.

    According to him, the widespread use of new industries and technologies, including the digital economy and artificial intelligence, is transforming the landscape of global trade and investment, opening up broad prospects for development.

    The Vice President of China called for expanding the innovative application of digital and intelligent technologies to stimulate the recovery and development of the world economy. According to him, it is necessary to jointly promote open cooperation, mutual benefit and win-win, uphold fairness and inclusiveness, and fill the digital and intellectual gaps to create more favorable conditions for international trade and investment cooperation.

    Han Zheng also pointed out the need to use digital and intelligent technologies to ensure the stable and smooth operation of global industrial and supply chains.

    China is committed to expanding high-level opening-up and promoting high-quality development, providing broad opportunities for enterprises around the world, the vice president stressed.

    The Global Trade and Investment Promotion Summit, organized by the China Council for the Promotion of International Trade, was held for the first time in 2022.

    This year’s summit focuses on entering the digital and intelligent era and working together for common development. More than 800 people are attending the event, including heads of foreign government departments, international organizations, overseas business associations and world trade promotion organizations, as well as representatives of Chinese and overseas enterprises. –0–

    MIL OSI Russia News –

    May 27, 2025
  • MIL-OSI USA: UMARY- USA.COM Issues Voluntary Nationwide Recall of UNAVY ÁCIDO HIALURÓNICO Caplets and UMOVY ÁCIDO HIALURÓNICO Caplets Due to the Presence of Undeclared Drug Ingredients Dexamethasone, Diclofenac and Omeprazole

    Source: US Department of Health and Human Services – 3

    Summary

    Company Announcement Date:
    May 21, 2025
    FDA Publish Date:
    May 22, 2025
    Product Type:
    Drugs
    Reason for Announcement:

    Recall Reason Description
    The product contains undeclared Dexamethasone, Diclofenac and Omeprazole

    Company Name:
    UMARY USA
    Brand Name:

    Brand Name(s)
    UNAVY & UMOVY

    Product Description:

    Product Description
    Unavy Acidio Hialuronico (30 caplets/850 mg) and Umovy Acidio Hialuronico (30 caplets/850 mg)

    Company Announcement
    FOR IMMEDIATE RELEASE – Date: May 21 2025, Nogales, AZ, UMARY USA is voluntarily recalling all lots of Unavy Ácido HIALURÓNICO (30 caplets/850 mg) and Umovy Ácido HIALURÓNICO (30 caplets/850 mg), to the consumer level. FDA laboratory analysis confirmed that these products are tainted with the drug ingredients Diclofenac, Dexamethasone and Omeprazole. Products containing Diclofenac, Dexamethasone or Omeprazole cannot be marketed as dietary supplements. UNAVY ÁCIDO HIALURÓNICO and UMOVY ÁCIDO HIALURÓNICO are unapproved new drugs for which safety and efficacy have not been established and, therefore, subject to recall.
    Risk Statement: Dexamethasone is a corticosteroid commonly used to treat inflammatory conditions. Corticosteroid use can impair a person’s ability to fight infections and can cause high blood sugar levels, muscle injuries, psychiatric problems, and lead to cardiovascular events. When corticosteroids are taken for a prolonged period, or at high doses, they can suppress the adrenal gland (a disorder in which the adrenal glands do not produce enough hormones) and adverse consequences can range from limited adverse consequences to death. Additionally, abrupt discontinuation can cause withdrawal symptoms. Diclofenac is a non-steroidal anti-inflammatory drug (commonly referred to as NSAIDs). Consumption of undeclared diclofenac could result in serious adverse events that include cardiovascular, gastrointestinal, renal, and anaphylaxis in patients taking concomitant NSAIDs and/or anticoagulants, in those who have allergies to diclofenac, or those with underlying illnesses. Omeprazole is a proton pump inhibitor (commonly referred to as PPI) used to treat gastric (stomach) acid-related disorders. Consumption of undeclared omeprazole may mask stomach issues such as erosions, ulcers, and stomach cancer. Consumption of undeclared dexamethasone, diclofenac, and omeprazole can also interact with other medications and cause serious side effects. Umary- usa.com has not received any reports of adverse events related to this recall.
    These products are marketed as dietary supplements for joint pain and arthritis. UNAVY ÁCIDO HIALURÓNICO is packaged in a white plastic container with a black background label, and white and yellow writing on it. The bottle has 30 caplets/ 850 mg. The affected product includes all lots and expiration dates. UMOVY ÁCIDO HIALURÓNICO is a black plastic bottle with a black label with white and blue lettering on the label. The bottle has 30 caplets/ 850mg. The affected product includes all lots and expiration dates. Product was distributed Nationwide via internet, exclusively via umary-usa.com.
    Umary-usa.com is notifying its distributors and customers by Press release and email and is arranging for return and refund of all recalled products. Consumers who have any of these products, should immediately work with their physician and/or health care provider to safely discontinue use of these products. Consumers with questions regarding this recall can contact umary-usa.com at umaryusa2025@gmail.com, available seven days a week, 24 hours a day. Consumers should contact their physician or healthcare provider if they have experienced any problems that may be related to taking or using this drug product.
    Adverse reactions or quality problems experienced with the use of this product may be reported to the FDA’s MedWatch Adverse Event Reporting program either online, by regular mail or by fax.

    This recall is being conducted with the knowledge of the U.S. Food and Drug Administration.

    Company Contact Information

    Media:
    Hugo Ramirez
    520-342-7385

    Product Photos

    Content current as of:
    05/22/2025

    Regulated Product(s)

    Follow FDA

    MIL OSI USA News –

    May 27, 2025
  • MIL-OSI USA: SPC MD 931

    Source: US National Oceanic and Atmospheric Administration

    Mesoscale Discussion 931

    Mesoscale Discussion 0931
    NWS Storm Prediction Center Norman OK
    0144 PM CDT Thu May 22 2025

    Areas affected…parts of western North Texas and adjacent
    southwestern Oklahoma

    Concerning…Severe potential…Watch possible

    Valid 221844Z – 222045Z

    Probability of Watch Issuance…60 percent

    SUMMARY…Isolated supercell development may initiate west through
    southwest of the Wichita Falls area during the next hour or two.
    Trends are being monitored for the possibility of a new severe
    weather watch.

    DISCUSSION…Deepening convective development is ongoing to the
    west-southwest of Wichita Falls TX, where a corridor of stronger
    heating/deeper boundary-layer mixing has contributed to weakening
    inhibition for boundary-layer parcels characterized by CAPE up to
    3000 J/kg. At the same time, southwestward propagating gravity
    waves and outflow, generated by the more intense earlier convection
    southwest of Ardmore OK, are approaching from the northwest and
    could support at least isolated intensifying thunderstorm
    development during the next hour or two. In the presence of
    moderate to strong west-northwesterly deep layer shear, this may
    include an evolving supercell posing a risk for large hail and
    strong damaging wind gusts.

    ..Kerr/Guyer.. 05/22/2025

    …Please see www.spc.noaa.gov for graphic product…

    ATTN…WFO…FWD…OUN…SJT…LUB…

    LAT…LON 33919977 34309889 34069831 33509816 33249849 33189937
    33049978 33340014 33919977

    MOST PROBABLE PEAK HAIL SIZE…2.00-3.50 IN

    Top/All Mesoscale Discussions/Forecast Products/Home

    MIL OSI USA News –

    May 27, 2025
  • MIL-OSI USA: Rep. Clyde Applauds Reopening of Several USACE Parks & Boat Ramps at Lake Lanier

    Source: United States House of Representatives – Representative Andrew S. Clyde (R-GA)

    GAINESVILLE, GA — Today, Representative Andrew Clyde (GA-09) released the following statement after the U.S. Army Corps of Engineers (USACE) confirmed only 11 recreational sites on Lake Lanier operated by the USACE will be temporarily closed ahead of Memorial Day weekend, down from the previously planned 21 closures. Additionally, no boat ramps within open sites will be impacted by closures.

    “Upon being informed about the park and boat ramp closures on Tuesday, I pressed the U.S. Army Corps of Engineers to reach a more acceptable solution to safely increase access to sites on Lake Lanier,” said Clyde. “I’m pleased that more Lake Lanier boat ramps will be open, and only 11 recreational sites will be temporarily closed. This is a significant improvement from the previously planned total of 21 site closures, expanding residents and visitors’ safe access to parks. I encourage folks to plan ahead accordingly, stay safe, and enjoy Memorial Day weekend on Lake Lanier.”

    Background

    Earlier this week, 21 federal parks on Lake Lanier were closed due to staffing shortages and safety concerns. Following outreach from Rep. Clyde, the Army Corps provided additional rangers to safely open more boat ramps and additional recreational sites on Lake Lanier.

    Additional information on the temporary closures is available on the USACE’s website HERE.

    MIL OSI USA News –

    May 27, 2025
  • MIL-OSI: ESET participates in operation to disrupt the infrastructure of Danabot infostealer

    Source: GlobeNewswire (MIL-OSI)

    • ESET Research has been tracking Danabot’s activity since 2018 as part of a global effort that resulted in a major disruption of the malware’s infrastructure.
    • While primarily developed as an infostealer, Danabot also has been used to distribute additional malware, including ransomware.
    • Danabot’s authors promote their toolset through underground forums and offer various rental options to potential affiliates.
    • This ESET Research analysis covers the features used in the latest versions of the malware, the authors’ business model, and an overview of the toolset offered to affiliates.
    • Poland, Italy, Spain and Turkey are historically one of the most targeted countries by Danabot.

    PRAGUE and BRATISLAVA, Czech Republic, May 22, 2025 (GLOBE NEWSWIRE) — ESET has participated in a major infrastructure disruption of the notorious infostealer, Danabot, by the US Department of Justice, the FBI, and US Department of Defense’s Defense Criminal Investigative Service. U.S. agencies were working closely with Germany’s Bundeskriminalamt, the Netherlands’ National Police, and the Australian Federal Police. ESET took part in the effort alongside Amazon, CrowdStrike, Flashpoint, Google, Intel471, PayPal, Proofpoint, Team Cymru and Zscaler. ESET Research, which has been tracking Danabot since 2018, contributed assistance that included providing technical analysis of the malware and its backend infrastructure, as well as identifying Danabot’s C&C servers. During that period, ESET analyzed various Danabot campaigns all over the world, with Poland, Italy, Spain and Turkey historically being one of the most targeted countries. The joint takedown effort also led to the identification of individuals responsible for Danabot development, sales, administration, and more.

    “Since Danabot has been largely disrupted, we are using this opportunity to share our insights into the workings of this malware-as-a-service operation, covering the features used in the latest versions of the malware, the authors’ business model, and an overview of the toolset offered to affiliates. Apart from exfiltrating sensitive data, we have observed that Danabot is also used to deliver further malware, which can include ransomware, to an already compromised system,” says ESET researcher Tomáš Procházka, who investigated Danabot.

    The authors of Danabot operate as a single group, offering their tool for rental to potential affiliates, who subsequently employ it for their malicious purposes by establishing and managing their own botnets. Danabot’s authors have developed a vast variety of features to assist customers with their malevolent motives. The most prominent features offered by Danabot include: the ability to steal various data from browsers, mail clients, FTP clients, and other popular software; keylogging and screen recording; real-time remote control of the victims’ systems; file grabbing; support for Zeus-like webinjects and form grabbing; and arbitrary payload upload and execution. Besides utilizing its stealing capabilities, ESET Research has observed a variety of payloads being distributed via Danabot over the years. Furthermore, ESET has encountered instances of Danabot being used to download ransomware onto already compromised systems.

    In addition to typical cybercrime, Danabot has also been used in less conventional activities such as utilizing compromised machines for launching DDoS attacks… for example, a DDoS attack against Ukraine’s Ministry of Defense soon after the Russian invasion of Ukraine.

    Throughout its existence, according to ESET monitoring, Danabot has been a tool of choice for many cybercriminals and each of them has used different means of distribution. Danabot’s developers even partnered with the authors of several malware cryptors and loaders, and offered special pricing for a distribution bundle to their customers, helping them with the process. Recently, out of all distribution mechanisms ESET observed, the misuse of Google Ads to display seemingly relevant, but actually malicious, websites among the sponsored links in Google search results stands out as one of the most prominent methods to lure victims into downloading Danabot. The most popular ploy is packing the malware with legitimate software and offering such a package through bogus software sites or websites falsely promising users to help them find unclaimed funds. The latest addition to these social engineering techniques are deceptive websites offering solutions for fabricated computer issues, whose only purpose is to lure victims into execution of a malicious command secretly inserted into the user’s clipboard.

    The typical toolset provided by Danabot’s authors to their affiliates includes an administration panel application, a backconnect tool for real-time control of bots, and a proxy server application that relays the communications between the bots and the actual C&C server. Affiliates can choose from various options to generate new Danabot builds, and it’s their responsibility to distribute these builds through their own campaigns.

    “It remains to be seen whether Danabot can recover from the takedown. The blow will, however, surely be felt, since law enforcement managed to unmask several individuals involved in the malware’s operations,” concludes Procházka.

    For technical overview of Danabot and insight into its operation, check out ESET Research blogpost: “Danabot: Analyzing a fallen empire” on WeLiveSecurity.com. Make sure to follow ESET Research on Twitter (today known as X), BlueSky, and Mastodon for the latest news from ESET Research.

    Worldwide Danabot detections as seen in ESET telemetry since 2018

    About ESET

    ESET® provides cutting-edge digital security to prevent attacks before they happen. By combining the power of AI and human expertise, ESET stays ahead of emerging global cyberthreats, both known and unknown— securing businesses, critical infrastructure, and individuals. Whether it’s endpoint, cloud, or mobile protection, our AI-native, cloud-first solutions and services remain highly effective and easy to use. ESET technology includes robust detection and response, ultra-secure encryption, and multifactor authentication. With 24/7 real-time defense and strong local support, we keep users safe and businesses running without interruption. The ever-evolving digital landscape demands a progressive approach to security: ESET is committed to world-class research and powerful threat intelligence, backed by R&D centers and a strong global partner network. For more information, visit www.eset.com or follow our social media, podcasts and blogs.

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/2306cbf1-1ef7-4040-8c12-ca8be3cc6689

    The MIL Network –

    May 27, 2025
  • MIL-OSI USA: Rep. Sara Jacobs Calls Out Trump Administration For Failing to Prioritize Sudan

    Source: United States House of Representatives – Congresswoman Sara Jacobs (D-CA-53)

    May 22, 2025

    Rep. Sara Jacobs (CA-51), Ranking Member of the House Foreign Affairs Subcommittee on Africa, today called out the Trump Administration for failing to prioritize Sudan and helping to bring an end to the war and genocide in Sudan.

    Watch Rep. Sara Jacobs’ Opening Remarks Here

    Rep. Sara Jacobs said:

    “Thank you, Chairman Smith, and thank you to all of our witnesses joining us today to testify and bring attention to the ongoing catastrophe in Sudan. Last month marked two years since the outbreak of war in Sudan. It is now the largest humanitarian crisis in the world. Nearly 25 million people – half of Sudan’s population – are facing acute hunger, and more than half a million people are facing famine. More than 13 million Sudanese have been displaced from their homes since the conflict began, including nearly four million people forced to flee across Sudan’s borders as refugees. I have seen this suffering firsthand when I traveled to Chad and met with Sudanese refugees last year.

    “And let’s be clear: this is a war of choice. The Rapid Support Forces (RSF), Sudanese Armed Forces (SAF), and allied militias have waged this war, committing war crimes and holding the Sudanese people captive for their own selfish interests. And their external backers, particularly the United Arab Emirates with their support to the RSF, in addition to Egypt, Turkey, Saudi Arabia, Iran, and Russia, have turned this war into a regional proxy war by supporting and arming either side, risking further regional destabilization.

    “But despite this, the Trump Administration is nowhere to be found. In fact, the Administration’s actions have only worsened the suffering of the Sudanese people. The Trump Administration’s sham “foreign assistance review” was really just a pretext to end most foreign assistance – like food aid, disaster relief, global health programs, development and economic aid, and more. In Sudan, it’s meant cancelling millions of dollars in U.S.-funded life-saving aid. For instance, before it was illegally dismantled, USAID was supporting the heroic efforts of the Sudanese Emergency Response Rooms (ERRs) to open community kitchens and provide basic meals to Sudanese civilians throughout the country. Following the massive cuts to U.S. foreign assistance, which included USAID support to the ERRs, more than 80% of the roughly 1500 community kitchens across Sudan have been forced to close their doors – cutting off vulnerable Sudanese civilians from life-saving food assistance. 

    “And the Administration hasn’t stopped there. Yesterday, they announced over $87 million worth of cancelled humanitarian programs, including $30 million for emergency nutrition, water, and food aid in Darfur. The SAF and the RSF continue to commit atrocities against the Sudanese people, and the people of Darfur are facing a second genocide in 20 years at the hands of the RSF. Yet despite the clear need for the United States to play an active role in negotiations to end this brutal conflict, the Trump Administration has failed to dedicate the resources necessary to do so. 

    “More than four months into President Trump’s term, the Administration has still failed to nominate an Assistant Secretary for the Bureau of African Affairs at the State Department, an NSC Senior Director for Africa, or a Special Envoy for Sudan – a position the Administration is required by law to fill. And just yesterday, during Secretary Rubio’s testimony, he actually refused to say the word genocide and reaffirm his previous statements that the RSF is in fact committing a genocide.

    “These actions – or lack thereof – show that Sudan is not a priority for the Trump Administration. And while the Administration ignores the conflict and its human consequences, it chooses instead to provide weapons to the UAE – a country that is arming the RSF, fueling the war and facilitating a genocide in Darfur. There is widespread and credible reporting that the UAE continues to funnel arms to the RSF, even though the UAE continues to deny this publicly. But instead of pressuring the UAE to stop arming the RSF forces currently carrying out a genocide, the Trump Administration has chosen to blow through a Congressional hold by Ranking Member Meeks and proceed with arms sales worth more than $1 billion. 

    “Just as I did under the Biden Administration, I believe that the United States needs to use its significant leverage with the UAE to pressure them to finally end their support to the RSF. That is why I, along with Ranking Member Meeks, introduced Joint Resolutions of Disapproval last week to block the Administration’s arms sales to the UAE. If the United States wanted to, we could take tangible actions and make sensible policy decisions that would help bring an end to the war in Sudan and a sustainable peace agreement that ends military rule, establishes a civilian government, and provides a clear roadmap to democratic elections. Instead, this Administration seems to be ignoring the problem and selling weapons that are fueling genocide, war crimes, crimes against humanity, and ethnic cleansing. 

    “The Sudanese people have suffered enough. It is time for the United States and the international community to step up and focus on bringing an end to this war so that the Sudanese people can finally rebuild their country. Thank you, Chairman Smith, and with that, I yield back.”

    ###

    MIL OSI USA News –

    May 27, 2025
  • MIL-OSI: From Onboarding to Settlement in Minutes: TransFi Launches BizPay to Redefine Global Business Payments

    Source: GlobeNewswire (MIL-OSI)

    TransFi launches BizPay, a unified global payment platform enabling instant, compliant cross-border transactions with AI-powered routing and 250+ local methods across 100+ countries

    NEW DELHI, May 22, 2025 (GLOBE NEWSWIRE) — In a world where time zones, banking systems, and regulatory barriers often complicate global transactions, one platform is leading the charge in rewriting the rules of cross-border finance. TransFi, a company known for building robust and compliant global payment infrastructure, has launched BizPay—a unified platform that enables businesses and individuals to send and receive money, initiate payouts, and accept pay-ins across 100+ countries, in just minutes.

    What makes BizPay stand out isn’t just its technology, but its deep understanding of what global businesses actually need: speed, transparency, and reliability. From self-onboarding to live payouts and collections, the platform strips away the layers of friction that have long plagued international payments. Users can sign up, connect their details, and start moving money globally—whether sending, receiving, paying out, or getting paid—in minutes.

    At the heart of BizPay is an engine built for precision. Using AI-powered dynamic routing and 70+ backend integrations, every payout or pay-in is optimized for the fastest and most cost-effective route—whether that’s via fiat or stablecoin rails. Paired with 250+ local payment methods, BizPay ensures funds flow not just fast, but fluently—reaching recipients in markets often underserved by legacy systems.

    With transparent pricing, real-time FX rates, and zero hidden fees, BizPay flips the script on how businesses think about cross-border money movement. For many, this could mean the difference between expanding into a new market—or holding back due to unpredictable costs and delayed settlements.

    With BizPay, TransFi isn’t just building a payment platform—it’s changing the way the world moves money. Sending, receiving, pay-ins, payouts—faster, cheaper, compliant, and secure—this is what cross-border payments should look like.
    What’s equally reassuring is the seamless integration of compliance. Automated checks on every transaction—whether pay-in or payout, standardized error codes, multi-jurisdictional safeguards, and adherence to global regulations ensure every transaction moves not just fast, but right. TransFi has built BizPay to not only scale with your business, but to protect it—ensuring every incoming or outgoing fund transfer is compliant from start to finish.

    In an increasingly connected world, BizPay feels less like a fintech product and more like an essential utility—a clean, powerful layer that makes global commerce feel local. No need to juggle multiple vendors, platforms, or legal frameworks—BizPay wraps collections, disbursements, payouts, pay-ins, and compliance into one intuitive solution. With this launch, TransFi isn’t chasing trends. It’s setting a new standard.

    Media Contact:
    Company Name: TransFi
    Contact Person Name: Farhan Ahmed
    Email id: farhan@transfi.com
    Company Website: https://www.transfi.com

    Disclaimer: This is a paid post and is provided by TransFi. The statements, views, and opinions expressed in this content are solely those of the content provider and do not necessarily reflect the views of this media platform or its publisher. We do not endorse, verify, or guarantee the accuracy, completeness, or reliability of any information presented. We do not guarantee any claims, statements, or promises made in this article. This content is for informational purposes only and should not be considered financial, investment, or trading advice.Investing in crypto and mining-related opportunities involves significant risks, including the potential loss of capital. It is possible to lose all your capital. These products may not be suitable for everyone, and you should ensure that you understand the risks involved. Seek independent advice if necessary. Speculate only with funds that you can afford to lose. Readers are strongly encouraged to conduct their own research and consult with a qualified financial advisor before making any investment decisions. However, due to the inherently speculative nature of the blockchain sector—including cryptocurrency, NFTs, and mining—complete accuracy cannot always be guaranteed.Neither the media platform nor the publisher shall be held responsible for any fraudulent activities, misrepresentations, or financial losses arising from the content of this press release. In the event of any legal claims or charges against this article, we accept no liability or responsibility. Globenewswire does not endorse any content on this page.

    Legal Disclaimer: This media platform provides the content of this article on an “as-is” basis, without any warranties or representations of any kind, express or implied. We assume no responsibility for any inaccuracies, errors, or omissions. We do not assume any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information presented herein. Any concerns, complaints, or copyright issues related to this article should be directed to the content provider mentioned above.

    A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/7359c43d-90f7-499b-818f-64647e04fa8d

    The MIL Network –

    May 27, 2025
  • MIL-OSI: Acceleware Ltd. Reports First Quarter 2025 Financial and Operating Results

    Source: GlobeNewswire (MIL-OSI)

    CALGARY, Alberta, May 22, 2025 (GLOBE NEWSWIRE) — Acceleware® Ltd. (“Acceleware” or the “Company”) (TSX-V: AXE), an advanced electromagnetic (“EM”) heating company with highly scalable solutions for large industrial applications, today announced its financial and operating results for the three months ended March 31, 2025 (all figures are in Canadian dollars unless otherwise noted). The Company’s products are branded EM Powered Heat and provide a pathway to economically electrify and decarbonize industrial heating processes previously considered difficult to abate. EM Powered Heat technology is powered by the Company’s proprietary Clean Tech Inverter (“CTI”) for applications including enhanced oil recovery (“RF XL”), mining and mineral processing, carbon capture, cement and concrete, and agri-food. In addition to EM Powered Heat, the Company also provides specialized scientific high-performance (“HPC”) software. This news release should be read in conjunction with the Company’s unaudited interim condensed financial statements and the accompanying notes for the three months ended March 31, 2025 and management’s discussion and analysis (“MD&A”) thereto, together with the audited financial statements for the year ended December 31, 2024, notes and MD&A thereto, all of which are available on Acceleware’s website at www.acceleware.com or on www.sedarplus.ca.

    HIGHLIGHTS

    Financial highlights:

      Three Months Ended
        March 31, 2025     March 31, 2024  
    Revenue $ 431,226   $ 43,594  
    Comprehensive loss $ (382,195 ) $ (969,971 )
    R&D expenditures $ 420,829   $ 501,115  
                 

    Acceleware is piloting RF XL at its commercial-scale RF XL pilot project at Marwayne, Alberta (the “RF XL Pilot”). The RF XL Pilot successfully demonstrated the potential of the technology in an operational environment. RF XL is the first application of the Company’s patent-protected CTI. Functionality of the CTI has been proven through scaled field tests conducted in 2019 and 2020, and over six months of operation at the RF XL Pilot. Please refer to the RF XL PILOT UPDATE section below for more information, and to the MD&A for a complete RF XL Pilot update.

    Based on positive results to date, Acceleware remains confident that RF XL will become viable as a critical technology in the effort to reduce production costs and decarbonize heavy oil and oil sands production. In 2024, the Company’s operations team continued data analysis, “history-matching” simulations and other analyses of operational data from tests in 2022. The analysis provides evidence that the operation of the RF XL Pilot resulted in sustained heating of the formation around the heating well prior to the pause in operations for maintenance and inspection. In particular, the Company successfully injected RF power into the heating well for over 200 days — a significant milestone and something that has never been achieved before. Also of note is that the CTI successfully operated for seven consecutive months at a variety of power levels and operating conditions during this time.

    In the three months ended March 31, 2025, the Company continued to work on the next iteration of the RF XL subsurface system to more concretely address technical issues that were illuminated during the first phase of heating at the RF XL Pilot. These iterations are also expected to significantly reduce the complexity of the subsurface structure, while reducing manufacturing and deployment costs once commercialized. This redesign work is now complete and ready for manufacturing and deployment. The Company is seeking funding for a second phase of heating at the RF XL Pilot incorporating the new subsurface design and existing surface facilities including the CTI. During 2024 the Company confirmed that the expected cost to redeploy the upgraded design at Marwayne would be approximately $5 million including contingency. Also in 2024, the Company announced that it had secured a total of up to $1.3 million in non-dilutive funding from the Clean Resource Innovation Network (“CRIN”) for the next phase of the RF XL Pilot, contingent on the Company sourcing the remaining $3.7 million. The Company has identified several industry and government potential funders and has discussed the project with them. The purpose of the second phase of heating at the RF XL Pilot is to enable higher power to be distributed into the reservoir for a sustained period, resulting in higher reservoir temperatures and oil production, to advance the potential commercial viability of RF XL technology.

    In addition to development work, and with results gained from RF XL deployment in Marwayne to date, Management has also initiated a strategic review of the commercialization plan for RF XL. The process involved analyzing various heavy oil and bitumen reservoirs in western Canada, with the goal of identifying the optimal resources for the demonstration of commercial viability of RF XL. These reservoirs included not only the vast McMurray oil sands, but also heavy oil plays including the Clearwater in north-central Alberta, the Bluesky in west-central Alberta, and the Mannville Stack in eastern Alberta and western Saskatchewan. The review process has led Management to conclude that heavy oil plays offer the greatest near-term potential for commercializing RF XL, due to lower initial capital per well, ability to scale from one heating well to many, lower operating cost to effectively decrease viscosity, and the potential for significant incremental production and ultimate recovery to make uneconomic resources economic. Once proven in heavy oil, Management believes the oil sands will offer significant market expansion potential.

    In Q1 2025 Acceleware’s board of directors approved an initiative proposed by Management to investigate (in parallel with continued effort to progress a second phase of heating at Marwayne) the opportunity for Acceleware, as an operator, to acquire rights to a suitable heavy oil property, and thereafter apply RF XL as a secondary recovery method to improve the property’s production, cashflow, ultimate recovery and asset valuation. Under this scenario, Acceleware would benefit from the valuation enhancement brought about by RF XL. Management has commenced its investigation pursuant to this initiative as of the date of this news release. In the three months ended March 31, 2025 the Company’s subsurface team refined its reservoir selection criteria and identified several promising locations for a commercial demonstration of RF XL.

    As of the date of this news release, the Company completed additional IMII-funded testing of a 100kg per hour prototype potash dryer with further promising results. IMII and its participating members had requested additional testing under various scenarios before considering the Company’s Phase 3 proposal for the design, construction and testing of a new, larger-scale prototype. Acceleware expects to learn if IMII and its members will sanction a Phase 3 project later this year. IMII’s minerals industry members include BHP, Cameco Corporation, Fission Uranium Corp., The Mosaic Company and Nutrien Ltd.

    During the three months ended March 31, 2025, Acceleware continued to invest in developing and protecting new intellectual property with the number of patents issued, allowed, applied for, or in development totalling 62. The Company has 28 patents granted or allowed to protect various proprietary technologies and 34 patent applications pending or under development. The Company uses an integrated strategy for IP protection involving a combination of patenting and trade secrets, working closely with the patent offices and intellectual property advisors.

    RF XL PILOT UPDATE
    Acceleware plans to initiate a second phase of heating after completing a proposed significant subsurface design upgrade to address the moisture ingress issue. Prior to the next phase of heating, all RF XL subsurface components will be removed, and substantially upgraded, and then redeployed. This plan was developed in consultation with industry partners and service providers and among the alternatives examined, it is expected to have the highest probability of achieving higher power injected into the reservoir for a sustained period. The subsurface design was further refined in Q1 2025 to more completely address the moisture ingress issue, to increase simplicity and to reduce costs for the commercial product. The refined design is not expected to materially impact the estimated cost for the second phase of heating at the RF XL Pilot. An estimated additional $5 million of funding is required to complete the redeployment including contingency, and Acceleware is actively working to raise these funds. Acceleware has secured $1.3 million partial funding for the redeployment conditional on securing the balance of the funds from industry partners or other sources. The final timing and cost of the redeployment and subsequent heating is uncertain and remains primarily dependent on financing, partner investment, the time required to source the remaining financing, and the successful deployment of repairs and components.

    Total direct funding received for the first phase of the RF XL Pilot was $24.4 million and included $5.9 million from Alberta Innovates, $5.5 million from Sustainable Development Technology Canada (“SDTC”), $5.0 million from Emissions Reduction Alberta (“ERA”), $3.0 million from CRIN and $5.0 million in aggregate from three oil sands operators. See discussion below in Financial Summary. In exchange for funding, the oil sands operators received exclusive access to detailed technical data and test results, prioritized rights to host a subsequent test, preferred pricing on pre-commercial products and preferred access to RF XL products. These major oil sands producers represent well over one million barrels of oil sands and heavy oil production per day.

    QUARTER IN REVIEW
    Revenue of $431 thousand was recorded in the three months ended March 31, 2025 (“Q1 2025”) compared to $44 thousand in the three months ended March 31, 2024 (“Q1 2024”) and $1.9 million in the previous quarter ended December 31, 2024 (“Q4 2024”). Revenue in Q4 2024 was substantially associated with deferred revenue recognized relating to a contract with one oil sands producer for the RF XL Pilot.

    Total comprehensive loss for Q1 2025 was $383 thousand compared to a comprehensive loss of $1.0 million for Q1 2024 and comprehensive income of $0.9 million for Q4 2024. The reduction in comprehensive loss in Q1 2025 compared to Q1 2024 was due to higher revenue and a significant reduction in R&D and G&A expenses. Comprehensive income in Q4 2024 was higher due to revenue related to the RF XL Pilot. Finance expense includes interest expense on convertible debentures and notes payable which are funding the Company’s working capital. Comprehensive income in all periods was impacted by changes in value of the derivative financial instruments embedded within the convertible debenture. The changes in derivative value are driven primarily by the fluctuation in the Company’s share price.

    R&D expenses incurred in Q1 2025 were $421 thousand compared to $501 thousand in Q1 2024 and $581 thousand in Q4 2024. R&D spending in Q1 2025 and Q4 2024 was related to the IMII dryer for potash ore and included lab engineering, designing and testing, data analysis, and partner consultations, and to further engineering on the next iteration of the RF XL Pilot. R&D spending in Q1 2024 was related to the RF XL Pilot. There was $nil government assistance received in Q1 2025, Q4 2024 and Q1 2024.

    G&A expenses incurred in Q1 2025 were $253 thousand compared to $452 thousand in Q1 2024 and $315 thousand in Q4 2024. There were lower non-cash payroll related costs incurred in Q1 2025 due to the timing of option grants and lower professional fees as the Company continues to prioritize cost control given uncertain economic conditions.

    As at December 31, 2024, Acceleware had negative working capital of $3.6 million (December 31, 2024 – negative working capital of $3.4 million) including cash and cash equivalents of $211 thousand (December 31, 2024 – $272 thousand). The increase in negative working capital is attributable to the decrease in cash as well as an increase in short term notes payable, and an increase in deferred management compensation.

    In the interests of matching cash requirements with a combination of cash generated from operations, external funding, and capital raising activities, the Company actively manages its cash flow and investments in new products. Acceleware intends to maximize cash generated from operations through several initiatives which include continuing to focus on higher gross margin software products that are marketed through a combination of direct and reseller models; minimizing operating expenses where possible; and limiting capital expenditures. As the Company continues to develop its RF Heating technology, new R&D investments will be financed through a combination of internal cash flow from the HPC business, project funding agreements, government assistance and external financing, when available.

    ABOUT ACCELEWARE:
    Acceleware is an innovator of clean-tech decarbonization technologies comprised of two business units: Radio Frequency Heating Technology and Seismic Imaging Software.  

    Acceleware is piloting RF XL, its patented low-cost, low-carbon production technology for heavy oil and oil sands that is materially different from any heavy oil recovery technique used today. Acceleware’s vision is that electrification of heavy oil and oil sands production can be made possible through RF XL, supporting a transition to much cleaner energy production that can quickly bend the emissions curve downward. With clean electricity, Acceleware’s RF XL technology could eliminate greenhouse gas (GHG) emissions associated with heavy oil and oil sands production. RF XL uses no water, requires no solvent, has a small physical footprint, can be redeployed from site to site, and can be applied to a multitude of reservoir types. Acceleware is also actively developing partnerships for RF heating of other industrial applications using the Company’s proprietary CTI.

    Acceleware and Saa Dene Group (co-founded by Jim Boucher) have created Acceleware | Kisâstwêw to raise the profile, adoption, and value of Acceleware technologies. The shared vision of the partnership is to improve the environmental and economic performance of the energy sector by supporting ideals that are important to Indigenous peoples, including respect for land, water, and clean air.

    The Company’s seismic imaging software solutions are state-of-the-art for high fidelity imaging, providing the most accurate and advanced imaging available for oil exploration in complex geologies. Acceleware is a public company listed on Canada’s TSX Venture Exchange under the trading symbol “AXE”.

    NOTE REGARDING FORWARD-LOOKING INFORMATION AND OTHER ADVISORIES
    This news release contains “forward-looking information” within the meaning of Canadian securities legislation. Forward-looking information generally means information about an issuer’s business, capital, or operations that are prospective in nature, and includes disclosure about the issuer’s prospective financial performance or financial position. 

    The forward-looking information in this press release can be identified by terms such as “believes”, “estimates”, “plans”, “potential”, and “will”, and includes information about, the expected commercialization of RF XL, the expected cost of the RF XL Pilot, the timing of the execution of the RF XL Pilot and the redeployment, expected financing required for the RF XL Pilot redeployment, the anticipated economic and societal benefits of the RF XL technology, and the future development plans related to potash ore drying prototypes. Acceleware assumes that current cost estimates are accurate, current timelines will not be delayed by either internal or external causes, that research and development effort including the commercial-scale test plans will result in commercial-ready products, and that future capital raising efforts will be successful.  

    Actual results may vary from the forward-looking information in this press release due to certain material risk factors. These risk factors are described in detail in Acceleware’s continuous disclosure documents, which are filed on SEDAR at www.sedar.com. 

    Acceleware assumes no obligation to update or revise the forward-looking information in this press release, unless it is required to do so under Canadian securities legislation. 

    This news release does not constitute an offer to sell or a solicitation of an offer to buy any of the securities described in this release in the United States. The securities have not been and will not be registered under the United States Securities Act of 1933, as amended (the “U.S. Securities Act”), or any state securities laws and may not be offered or sold within the United States or to U.S. persons unless registered under the U.S. Securities Act and applicable state securities laws or an exemption from such registration is available. 

    DISCLAIMER

    Neither the TSX Venture Exchange nor its Regulation Services Provider (as that term is defined in the policies of the TSX Venture Exchange) accepts responsibility for the adequacy or accuracy of this release.

    For more information:
    Geoff Clark
    Tel: +1 (403) 249-9099
    geoff.clark@acceleware.com

    Acceleware Ltd.
    435 10th Avenue SE
    Calgary, AB, T2G 0W3
    Canada
    Tel: +1 (403) 249-9099
    www.acceleware.com

    The MIL Network –

    May 27, 2025
  • MIL-OSI: Univest Securities, LLC Announces Closing of $5 Million Registered Offering for its Client WORK Medical Technology Group LTD (NASDAQ: WOK)

    Source: GlobeNewswire (MIL-OSI)

    New York, New York, May 22, 2025 (GLOBE NEWSWIRE) — Univest Securities, LLC (“Univest”), a member of FINRA and SIPC, and a full-service investment bank and securities broker-dealer firm based in New York, today announced the closing of registered offering (the “Offering”) for its client WORK Medical Technology Group LTD (Nasdaq: WOK) (the “Company”), a supplier of medical devices in China, through its subsidiary, Work (Hangzhou) Medical Treatment Equipment Co., Ltd. and its subsidiaries in China.

    Under the terms of the securities purchase agreement, the Company has agreed to sell to several investors for the purchase and sale of an aggregate of 10,000,000 ordinary units (the “Ordinary Units”) at an offering price of $0.50 per Ordinary Unit.

    Each Ordinary Unit consists of one Class A ordinary share, par value $0.0005 (a “Class A Ordinary Share”), one Series A warrant to purchase one Class A Ordinary Share at an exercise price of $1.00 (a “Series A Warrant”), and one Series B warrant to purchase one Class A Ordinary Share at an exercise price of $1.00 (a “Series B Warrant”). The Series A Warrants and Series B Warrants are immediately exercisable upon issuance, with the Series A Warrants expiring in 12 months, and Series B Warrants expiring in 3 months.

    The aggregate gross proceeds to the Company were approximately $5 million.

    Univest Securities, LLC acted as the sole book-running manager.

    The registered offering was made pursuant to a registration statement on Form F-1 (File No. 333-284006) previously filed by the Company and declared effective by the U.S. Securities and Exchange Commission (“SEC”). A final prospectus supplement and accompanying prospectus describing the terms of the proposed offering were filed with the SEC and are available on the SEC’s website located at http://www.sec.gov. Electronic copies of the final prospectus supplement and the accompanying prospectus may be obtained, by contacting Univest Securities, LLC at info@univest.us, or by calling +1 (212) 343-8888.

    This press release shall not constitute an offer to sell or a solicitation of an offer to buy nor shall there be any sale of these securities in any state or jurisdiction in which such offer, solicitation or sale would be unlawful prior to registration or qualification under the securities laws of any such state or jurisdiction.

    About Univest Securities, LLC

    Registered with FINRA since 1994, Univest Securities, LLC provides a wide variety of financial services to its institutional and retail clients globally including brokerage and execution services, sales and trading, market making, investment banking and advisory, wealth management. It strives to provide clients with value-add service and focuses on building long-term relationship with its clients. For more information, please visit: www.univest.us.

    About WORK Medical Technology Group LTD

    WORK Medical Technology Group LTD, through its subsidiary, Work (Hangzhou) Medical Treatment Equipment Co., Ltd. and its subsidiaries in China, is a supplier of medical devices that develops and manufactures Class I and II medical devices and sells Class I and II disposable medical devices through operating subsidiaries in China. The Company has a diverse product portfolio comprising 21 products, including customized and multifunctional masks and other medical consumables. All the products have been sold in 34 provincial-level administrative regions in China, with 15 of them sold in more than 30 countries worldwide. The Company has received a number of quality-related manufacturing designations and has registered 17 products with the U.S. Food and Drug Administration allowing their products to enter the U.S. market. For more information, please visit the Company’s website: https://www.workmedtech.com/corporate.

    Forward-Looking Statements

    This press release contains forward-looking statements as defined by the Private Securities Litigation Reform Act of 1995. Forward-looking statements include statements concerning plans, objectives, goals, strategies, future events or performance, and underlying assumptions and other statements that are other than statements of historical facts. When the Company uses words such as “may, “will, “intend,” “should,” “believe,” “expect,” “anticipate,” “project,” “estimate” or similar expressions that do not relate solely to historical matters, it is making forward-looking statements. Forward-looking statements are not guarantees of future performance and involve risks and uncertainties that may cause the actual results to differ materially from the Company’s expectations discussed in the forward-looking statements. These statements are subject to uncertainties and risks including, but not limited to, the uncertainties related to market conditions and the completion of the initial public offering on the anticipated terms or at all, and other factors discussed in the “Risk Factors” section of the registration statement filed with the SEC. For these reasons, among others, investors are cautioned not to place undue reliance upon any forward-looking statements in this press release. Additional factors are discussed in the Company’s filings with the SEC, which are available for review at www.sec.gov. Univest Securities LLC and the Company undertakes no obligation to publicly revise these forward-looking statements to reflect events or circumstances that arise after the date hereof.

    For more information, please contact:

    Univest Securities, LLC
    Edric Guo
    Chief Executive Officer
    75 Rockefeller Plaza, Suite 18C
    New York, NY 10019
    Phone: (212) 343-8888
    Email: info@univest.us

    The MIL Network –

    May 27, 2025
  • MIL-OSI USA: Murray Presses FDA Commissioner on Senseless and Inefficient Mass Firings, Conflicts of Interest at FDA & Trump Admin Laying the Groundwork to Rip Away Mifepristone

    US Senate News:

    Source: United States Senator for Washington State Patty Murray

    ICYMI: Murray Grills Trump’s FDA Nominee on Cancellation of Critical Vaccine Meeting, Upholding Science on Mifepristone, Contraception

    ***WATCH: Senator Murray Q&A with Commissioner Makary***

    Washington, D.C. — Today, at a Senate Appropriations Agriculture, Rural Development, Food and Drug Administration, and Related Agencies (Ag-FDA) Subcommittee hearing on the fiscal year 2026 budget request for the Food and Drug Administration (FDA), U.S. Senator Patty Murray (D-WA), Vice Chair of the Senate Appropriations Committee and a senior member and former Chair of the Senate Health, Education, Labor and Pensions (HELP) Committee, grilled FDA Commissioner Marty Makary on the Trump administration’s reckless and chaotic efforts to fire thousands of critical employees at the FDA, conflicts of interest at the agency, and the Trump administration’s attempts to lay the groundwork to rip away access to mifepristone based on discredited junk science from anti-abortion activists.

    In opening comments, Vice Chair Murray said:

    “Commissioner Makary, the FDA has a really important job to do. Lives literally are at stake. And that work requires the utmost diligence, and care, and commitment to following the science and upholding FDA’s gold standard. We all expect to walk into the drugstore and know that what we are buying has passed a safety and efficacy standard. And we have to be assured of that, and we have to be assured that the work’s been done—that we don’t have to question that.  

    “So, I don’t think it’s careful leadership when one-in-five people across the FDA are fired, only to frantically then bring some back—because you didn’t stop and think two seconds about whether these jobs were actually important.

    “We really, Mr. Chairman, cannot cheap out on the FDA, and expect to maintain the gold standard that means that people know that drugs are safe.

    “We can’t just cut, cut, cut and hope no one gets sick when you’re slow to issue a recall, or hope no one needs that medicine that had its approval delayed, or hope there isn’t another infant formula issue while your staff are getting fired, or getting rehired, or wherever they are.

    “This work really takes investments, this Committee knows that, and it expects expert staff—like the people that have been shoved out the door. Drug approvals are already getting delayed. Food and drug safety inspections are lagging behind.

    “We are going in the wrong direction, fast. We still have yet to see from you a full budget request from you. That is unacceptable.

    “You are now testifying that the budget proposes to slash FDA by more than 11 percent. That’s actually news to all of us—and I will tell you right now, that is not going to fly. It is reckless, and it is not going to happen as long as I have anything to say about it.”

    [FDA STAFFING]

    Senator Murray began her questioning by pressing Dr. Makary on the harm and inefficacy caused by the Trump administration’s mass layoffs and efforts to push out qualified employees across FDA, which have resulted in more than 4,000 staff leaving the agency since the beginning of the Trump administration. “Commissioner Makary, when it comes to your mass firing of FDA employees, in April, you said, ‘I can tell you there were no cuts to scientists or inspectors.’ Well that is not true,” Senator Murray said. “I think Senator Ossoff covered that, and I think the point here is that all of this firing and rehiring—I don’t see how that’s efficient. Frankly, it kind of shows that you don’t know what you’re doing—and you’re breaking things in the process here. So, let me ask you a question, and hopefully it is an easy one for you. Does it save taxpayer dollars to fire staff who work in centers that are fully funded by user fees—not taxpayer dollars—yes or no?”

    “You asked me to do an assessment of the staff when I came here for my confirmation hearing, and I hear that you’re criticizing me for bringing back some individuals after the cuts that I was not a part of,” replied Commissioner Makary.

    “That’s good—I’m just saying in the long run, this has been very inefficient,” Senator Murray replied. “But my question to you is not about that it, and I know you’ve covered it with several other members. So does it save taxpayer dollars to fire staff who work with centers that are fully funded by user fees, not taxpayer dollars. Is that efficient?”

    “The cuts were to HR, IT, communications—,” Commissioner Makary said.

    Senator Murray pressed, “They’re funded by user fees, it is not saving any money.”

    “In part,” Commissioner Markey interjected.

    “But many of the staff you fired were in centers that are actually fully funded by user fees. You know that, correct?” Senator Murray clarified.

    Commissioner Makary continued to dodge.

    “I’m asking you a specific question about the centers that are fully funded by user fees,” Senator Murray continued.

    “That’s one center. That’s the tobacco center,” Commissioner Makary said. “You just said we can’t just keep cut and cut—we can’t keep hiring and hiring, the agency doubled since 2007. So, let me ask you, what is the right number of employees?”

    “No, you’re here to answer my questions here, and I’m going to ask some more,” Senator Murray replied. “Without critical support staff you fired, inspectors cannot plan their trips. They cannot do their jobs. I want to ask you, what percent of planned inspections has FDA missed since those April 1st firings?”

    Commissioner Makary said, “In the 12 labs that we have that evaluate food products in the food inspection realm, there are no—as of last week, I just did a check—there are no backlogs. They are running at 100 percent efficiency. There are no drug approval delays despite the—you know, what people want to attribute—”

    “That is not what I’ve been told. I have been told—and I would like you to go back and check and report back to us, because we know that some of the planned inspections… that were supposed to take place have been missed. And, to me, why that’s so important, if there is not inspections, the public doesn’t have the information that they need. I am going to run out of time, so I want to move on,” Senator Murray replied.

    “There are no cuts to inspectors,” Commissioner Makary said.

    “Will you go back and check for me, please?” asked Senator Murray.

    “Absolutely,” replied Commissioner Makary.

    [CONFLICTS OF INTEREST]

    Senator Murray continued by asking about reports of eyebrow-raising conflicts of interest at FDA: “I understand that the FOIA staff producing documents related to ongoing litigation by the Children’s Health Defense—Secretary Kennedy’s organization—was shielded from the RIFs, while other FOIA staff are responsible for FOIA responses at other FDA centers were targeted for termination. Is that true?,” Murray asked.

    “That’s not true, senator, we have our FOIA staff. They continue to work at the FDA. I’ve made sure that all the FOIA staff at the FDA are doing their job. We are also using AI to reduce the burden on that staff,” responded Commissioner Makary.

    Senator Murray pressed, “Well for the record, my understanding is that the Children’s Health Defense FOIA staff were not fired when other ones were… And that seems like a real conflict of interest to me, considering that the Secretary’s extensive history with that organization, Children’s Health Defense, and his goal to remove authorizations for vaccines. So, I just want that on the record—”

    “It’s not true. Well, all FOIA staff are in place,” Commissioner Makary continued to claim.

    [MIFEPRISTONE]

    Senator Murray moved on to her next question, pressing Commissioner Makary on the Trump administration’s attempts to lay the groundwork to restrict access to medication abortion based on junk science being pushed by anti-abortion extremists. Murray asked: “If a study came out saying that people who took a certain medication experience a certain rate of ‘serious adverse events,’ but the study’s authors refused to say what they were counting as an adverse event—would raise some serious questions about the study’s validity?”

    “Yes, senator. So I have the natural inquisition of a scientist that’s done a lot of research. So, I would want to see the underlying data, yes,” replied Commissioner Makary.

    “I am, of course, talking about the recent sham ‘study’ from the Ethics and Public Policy Center—it’s an anti-abortion group, it’s bank-rolled by extremists, they fought to overturn Roe v. Wade,” Murray said. “And this ‘study,’ if you can call it that, is unsound and has been widely panned by medical experts. But, days after its release, you and Secretary Kennedy are now suggesting we need a ‘complete review’ on the safety of mifepristone.”

    “Now, to be clear: mifepristone has been proven safe and effective in more than 100 studies over three decades. And the people that are now pushing that bogus ‘study’ and saying mifepristone is dangerous for women are the exact same people who think that abortion is never necessary to save a woman’s life, and that 10-year-olds should somehow be forced into childbirth. I believe that this administration is laying the groundwork to rip away access to medication abortion across the country,” Murray said. “This has not gotten enough attention. And I know you’d prefer to keep it that way, but I want you to know: I’m not going to let that happen.”

    “I have not seen that study, Senator, and you have not seen that study. So how can you call it a sham, bogus study? Neither of us have seen the study, the underlying data, or the methodology,” Commissioner Makary said.

    “Actually, that’s not true,” Murray replied. The Ethics and Public Policy Center is an anti-abortion advocacy group that was an advisory board member for Project 2025, has submitted amicus briefs to the Supreme Court opposing mifepristone, and does not believe in life-saving abortions—putting them far outside the medical mainstream. As the Washington Post fact-check of the ‘study’ points out, unlike most credible medical studies, the Ethics and Public Policy Center report did not undergo a formal external peer review before publication and “moreover, the report oddly does not reveal the database it used”—making it impossible for anyone to view the underlying data. That hasn’t stopped the anti-abortion Ethics and Public Policy Center from launching an activist campaign around the release of the data and even admitting the goal was to “eliminate” abortion pills.

    On May 14th in a HELP Committee hearing with Health and Human Services Secretary Robert F. Kennedy (RFK) Jr. Senator Josh Hawley (R-MO) secured a commitment from Secretary Kennedy that HHS and FDA would review what RFK Jr. referred to as “alarming” new data on mifepristone—referencing the EPCC study alone. “It’s alarming, and it indicates that at the very least, the label should be changed,” Secretary Kennedy said. “I’ve asked Marty Makary at the FDA to do a complete review and report back.” Senator Hawley secured the same commitment from President Trump’s nominee to serve as Deputy Secretary of Health and Human Services in a HELP Committee hearing on May 8th—again, based solely on the EPCC ‘study’ that has not been peer-reviewed or published in a medical journal and has attracted widespread scrutiny for appearing to dramatically overstate what it characterizes as “serious adverse effects” associated with the pill.

    ____________________________________

    As a longtime appropriator and former Chair of the Senate HELP Committee, Senator Murray has a long history of demanding accountability and careful oversight when it comes to the safety of products families use every day. At the end of 2022, Senator Murray passed legislation giving FDA new authority to, for the first time ever, regulate the safety of cosmetic products and force a recall when necessary—and she successfully fought to secure funding for this important work last year as Chair of the Senate Appropriations Committee. Senator Murray has also previously pressed FDA and industry for answers and action regarding asbestos in children’s make up kits, demanded answers from Johnson & Johnson regarding asbestos found in baby powder, and was a leading voice in holding FDA accountable and pushing for solutions following the infant formula contamination and shortage crisis in 2022.

    Senator Murray leads the Democratic caucus on reproductive health care and, throughout her career, has beat back countless Republican attempts to defund Planned Parenthood and other family planning services—and is widely credited with successfully pushing the Bush administration’s FDA to follow the science and make Plan B available over the counter. Senator Murray led the response in Congress to FDA v. Alliance for Hippocratic Medicine, a lawsuit brought by Republican anti-abortion extremists trying to rip away access to mifepristone, a safe and effective abortion medication that was approved by FDA in 2000—Murray led multiple amicus briefs, organized her colleagues, and raised the alarm at every turn. Last June, the Supreme Court dismissed the case on standing groups but Murray made clear that “the nationwide threat to medication abortion has not gone away—far from it. If Donald Trump and his anti-abortion allies return to power, they will do everything they can to rip away access to mifepristone and ban abortion nationwide.” Murray also spearheaded efforts in Congress urging the FDA to follow the science and review the application of Opill, the first over-the-counter birth control pill, after the FDA’s Advisory Committee voted unanimously to recommend FDA approval.

    In March, at Dr. Makary’s nomination hearing before the Senate HELP Committee, Senator Murray pressed Dr. Makary to commit to upholding the science on mifepristone and contraception—he refused to definitively answer her question.

    MIL OSI USA News –

    May 27, 2025
  • MIL-OSI New Zealand: Parliament Hansard Report – Taxation (Budget Measures) Bill (No 2) — In Committee—Part 1 – 001481

    Source: Govt’s austerity Budget to cause real harm in communities

    Hon SIMON WATTS (Minister of Revenue): Thank you very much, Madam Chair. Look, a very good morning, everyone. Welcome back to the growth Budget, and what a great Budget it is. I don’t mind doing a basic lesson in what depreciation is for the member because, in effect, what we are doing is increasing the rate at which people can claim a tax deduction, increasing it in the first year and the balance will be claimed for the rest of the asset life. This is a timing difference; we are bringing forward that ability to claim that tax deduction. We’re not creating some new world or new paradigm of other aspect. We are simply moving that benefit forward so that New Zealand businesses can achieve a tax deduction—from yesterday—and get the benefit of that in terms of less tax this year.

    That is a significant investment and opportunity for them as a business. But it in no way has any impact on what would be a normal rate of depreciation on any economic asset over the life of that asset. So the whole premise of the question is uninformed and without basis. Our policy is very much focused on delivering that economic growth. And heck, I mean, I guess some people in the House are concerned about too much economic growth. But on this side of the House, we think a little bit differently. We sort of think economic growth is a good thing. It sort of helps us with a range of factors including higher paid jobs, better standard of living, and more tax revenue flows.

    CHAIRPERSON (Barbara Kuriger): That’s true, but that’s not what the member asked the Minister, thank you.

    Hon SIMON WATTS: Well, the member asked about the risks in regards to the policy and I have clarified that it is a depreciation policy which is well articulated in accounting standards.

    MIL OSI New Zealand News –

    May 27, 2025
  • MIL-OSI New Zealand: Parliament Hansard Report – Thursday, 22 May 2025 (continued on Friday, 23 May 2025) – Volume 784 – 001482

    Source: Govt’s austerity Budget to cause real harm in communities

    Hon SIMON WATTS (Minister of Revenue): Thank you very much, Madam Chair. Look, a very good morning, everyone. Welcome back to the growth Budget, and what a great Budget it is. I don’t mind doing a basic lesson in what depreciation is for the member because, in effect, what we are doing is increasing the rate at which people can claim a tax deduction, increasing it in the first year and the balance will be claimed for the rest of the asset life. This is a timing difference; we are bringing forward that ability to claim that tax deduction. We’re not creating some new world or new paradigm of other aspect. We are simply moving that benefit forward so that New Zealand businesses can achieve a tax deduction—from yesterday—and get the benefit of that in terms of less tax this year.

    That is a significant investment and opportunity for them as a business. But it in no way has any impact on what would be a normal rate of depreciation on any economic asset over the life of that asset. So the whole premise of the question is uninformed and without basis. Our policy is very much focused on delivering that economic growth. And heck, I mean, I guess some people in the House are concerned about too much economic growth. But on this side of the House, we think a little bit differently. We sort of think economic growth is a good thing. It sort of helps us with a range of factors including higher paid jobs, better standard of living, and more tax revenue flows.

    CHAIRPERSON (Barbara Kuriger): That’s true, but that’s not what the member asked the Minister, thank you.

    Hon SIMON WATTS: Well, the member asked about the risks in regards to the policy and I have clarified that it is a depreciation policy which is well articulated in accounting standards.

    MIL OSI New Zealand News –

    May 27, 2025
  • MIL-OSI USA: News 05/22/2025 VIDEO: Tennessee Artist Martina McBride Urges Congress to Pass Blackburn’s NO FAKES Act

    US Senate News:

    Source: United States Senator Marsha Blackburn (R-Tenn)
    WASHINGTON, D.C. – U.S. Senator Marsha Blackburn (R-Tenn.), Chair of the Senate Judiciary Subcommittee on Privacy, Technology, and the Law, led a hearing examining the consequences of AI-generated deepfakes. During the hearing, Tennessee multi-platinum country music singer-songwriter, Martina McBride, called on Congress to pass Senator Blackburn’s NO FAKES Act to protect individuals and creators from digital replicas. Read more about this legislation here, and watch full video of the hearing here.

    Click here to download this photo of Martina McBride with Senators Blackburn, Coons, and Klobuchar, who co-authored the NO FAKES Act.  
    Blackburn: Deepfakes Pose Significant Threat to Livelihoods of All American Artists & Creators 
    Senator Blackburn: “Deepfakes cause tremendous harm, and today we’re going to examine those harms and the legislative solutions, including the NO FAKES Act that Senators Coons, Klobuchar, Tillis, and I have introduced… specifically to address these harms. First, these deepfakes pose significant harm to our content creators. From Music Row to Beale Street back over to the Smoky Mountains in Upper East Tennessee, Tennesseans have made their mark in the music world, and we’ve got one of those artists with us today. But the proliferation of these digital replicas created without the artists’ consent pose a real threat to their livelihoods and the livelihoods of all American artists and creators. The NO FAKES Act is a monumental step forward in protecting our creative community. It provides landmark protection of the voice and visual likenesses of all individuals and creators from the spread of these digital replicas that are created without their consent… All these content creators, our children, and all Americans deserve nothing less than our best efforts on this issue.”
    McBride Calls on Congress to Pass ‘Landmark’ NO FAKES Act to Provide a Roadmap for AI and Protect Creators’ ‘Most Personal Human Attributes’
    Martina McBride: “Today, my voice and likeness, along with so many others, are at risk… The NO FAKES Act would give each of us the ability to say when and how AI deepfakes of our voices and likenesses can be used. If someone doesn’t ask before posting a harmful deepfake, we could have it removed without jumping through unnecessary hoops or going to court. It gives every person the power to say ‘yes’ or ‘no’ about how their most personal human attributes are used. It supports AI technology by providing a roadmap for how these powerful tools can be developed in the right way, and it doesn’t stand in the way of protected uses like news, parodies, or criticism… I urge you to pass the bill now.” 
    Click here to download video of Senator Blackburn’s opening statement.
    Click here to download video of the full hearing.

    MIL OSI USA News –

    May 27, 2025
  • MIL-OSI: Prairie Provident Reports on AGM Voting Results

    Source: GlobeNewswire (MIL-OSI)

    CALGARY, Alberta, May 22, 2025 (GLOBE NEWSWIRE) — Prairie Provident Resources Inc. (“Prairie Provident” or the “Company”) (TSX:PPR) announces voting results from its annual and special shareholders’ meeting held today (the “Meeting”). A total of 1,216,965,050 common shares, representing approximately 86.8% of the Company’s issued and outstanding common shares, were represented in person or by proxy at the Meeting.

    All of the matters put forward to the shareholders, as set out in the Company’s notice of meeting and information circular dated April 15, 2025 (the “Information Circular”), a copy of which is available from the SEDAR+ website at www.sedarplus.ca or the Prairie Provident website at www.ppr.ca, were approved by the requisite majority of votes cast at the Meeting.

    Election of Directors

    At the Meeting, each of Glenn Hamilton, Dale Miller, Matthew Shyba and Kathy Turgeon was elected, by ordinary resolution, as a director of Prairie Provident for the ensuing year, to hold office until the close of the next annual meeting of shareholders.

    Following are details as to the number of votes cast ‘for’ the election of each director nominee at the Meeting, and the percentage that figure represented of the total shares voted or withheld from voting in respect of that nominee.

    Director Number of votes FOR election % of total votes FOR
    Glenn Hamilton 1,207,754,472 99.9%
    Dale Miller 1,207,856,769 99.9%
    Matthew Shyba 1,207,691,265 99.9%
    Kathy Turgeon 1,207,736,113 99.9%


    Other Matters

    Shareholders also passed at the Meeting a series of resolutions approving, in each case by a majority of over 99% of votes cast, all other items of business set out in the Information Circular These other items of business consisted of: (i) appointing Ernst & Young LLP as the auditor of the Company for the ensuing year; (ii) approving unallocated entitlements under the Prairie Provident stock option plan and incentive security plan, as well as certain amendments to such plans; (iii) approving a consolidation of the outstanding common shares, and authorizing the Company’s board of directors to determine a consolidation ratio between 20-to-1 and 30-to-1; and (iv) approving amendments to the Company’s authorized share capital to create a new class of non-voting common shares.

    No further determinations have been made with respect to the proposed share consolidation, which remains subject to acceptance by the Toronto Stock Exchange (TSX). Upon the Prairie Provident board of directors determining to proceed with the consolidation, the Company will issue a news release to announce the consolidation ratio, the timing for implementation and the commencement of TSX trading on a post-consolidation basis, and the process for registered shareholders to exchange certificates evidencing pre-consolidation shares for new certificates or direct registration system (DRS) advice statements evidencing post-consolidation shares.

    ABOUT PRAIRIE PROVIDENT

    Prairie Provident is a Calgary-based company engaged in the development of oil and natural gas properties in Alberta. The Company’s strategy is to optimize cash flow from our existing assets to fund low risk development, maintain stable cash flow, while limiting its production decline.

    For further information, please contact:

    Dale Miller, Executive Chairman
    Phone: (403) 292-8150
    Email: investor@ppr.ca

    The MIL Network –

    May 27, 2025
  • MIL-OSI United Kingdom: More Teachers to benefit from flexible working

    Source: United Kingdom – Executive Government & Departments

    Press release

    More Teachers to benefit from flexible working

    Government extend successful programme that supports teachers to plan lessons from home, job-share or work flexible hours.

    More teachers are expected to benefit from flexible working thanks to a successful initiative that will help improve teacher retention and deliver high standards for pupils. 

    The Government’s Flexible Working Ambassadors Programme has been extended for a further year to support more schools across the country, enabling teachers to plan lessons from home, job-share or work flexible hours – so they have the time and energy to be at the front of the classroom, delivering high and rising standards for children.

    As part of its Plan for Change, the Government is committed to recruiting an additional 6,500 expert teachers over the course of this Parliament, so every young person has access to an excellent education. The quality of teaching is the single biggest driver of higher standards in schools.

    Hundreds of millions of pounds are also being invested by Government to offer tax free financial incentives and professional development to attract and keep the best and brightest teachers across the country, alongside targeted action to improve teachers’ workload and wellbeing.

    This action is working, with two thousand more secondary school teachers training this year than last, a 25% increase in the number of people accepting teacher training places in STEM subjects, and more teachers forecasted to stay in the profession.

    The announcement today follows the Government accepting the schoolteachers’ pay body recommendation which will give teachers a pay boost of 4% from this September, taking a major step towards re-establish teaching as an attractive, expert profession. 

    This builds on the work already underway to drive high and rising standards for all schools, including a stronger accountability system through reforms to Ofsted inspection, new regional improvement teams to tackle poorly performing schools, and a new, rich and broad curriculum so pupils are set up for life, work and the future.

    Schools Minister, Catherine McKinnell said:

    My number one priority is making sure every child has an expert teacher at the front of their classroom, as we know high-quality teaching makes the biggest difference to education outcomes.

    We highly value our brilliant teachers, and they deserve working conditions that recognise their professionalism and support their wellbeing. 

    I’ve seen first-hand how working flexibly can transform teachers’ lives for the better and drive high and rising high standards for their pupils. Our Flexible Working Ambassadors Programme will help make sure we deliver on our pledge to recruit and retain more teachers.

    The latest figures show that 46 per cent of teachers had a flexible working arrangement in place in 2024, up by 6 percentage points since 2022. But with 47 per cent of teaching staff who said they were considered leaving state education citing a lack of flexible working opportunities as one of the reasons, the Government is going further and faster to ensure every school supports their staff’s working lives in modern, practical ways – delivering the best possible education for children and young people.

    Evidence shows a high-quality teacher can make around half a GCSE grade difference per pupil per subject, showing the importance of allowing teachers to work flexibly, to retain the best teachers and help children achieve and thrive. 

    Research also found 82 per cent of school leaders offering flexible working agreed that it had helped to retain teachers who might otherwise leave. 62 per cent of parents said children being taught by two teachers in a job-share arrangement had no impact, or a positive impact, on their child

    CEO of Reach Schools, Rebecca Cramer said:

    Flexible Working is imperative to keep great teachers in the classroom.  Through the FWAMS programme we have supported schools to employ a culture of openness and communication around how teachers work.

    Schools that think innovatively and embrace change around teachers’ work arrangements enhance teacher well-being and productivity and ultimately have a positive impact on the young people in our classrooms.

    Director of Humanities and Social Sciences at Reach Academy Feltham, Sarah Corrigan said:

    Flexible working has allowed me to stay in the classroom doing something that I love. Without the option of part-time work and some full-time flex, I would have struggled with my work life balance and would have left the teaching profession. 

    Reach has supported me to return from maternity leave on a part-time basis. Also, like all other teachers in our school, I have been encouraged to take advantage of flex to ensure that I don’t miss the big events in my and my family’s lives by using term time annual leave and compressed hours.

    The programme is free to all schools and helps to drive the culture change needed, by offering a range of practical support and resources for schools and teachers.

    The extension means more schools can get involved in every region of the country, with a focus on supporting schools in disadvantaged areas, as well as special and alternative provision schools where there can be additional challenges. 

    The Government is also leading the way in modernising the education sector by harnessing the power of AI to free up teachers’ time and unlock more pupil interactions.

    Using AI can reduce time spent on admin by several hours a week which is critical to retaining good teachers and bringing more people into the profession – so that teaching can once again be a profession that sparks joy, not burnout.

    Share this page

    The following links open in a new tab

    • Share on Facebook (opens in new tab)
    • Share on Twitter (opens in new tab)

    Updates to this page

    Published 23 May 2025

    MIL OSI United Kingdom –

    May 27, 2025
  • MIL-OSI Economics: Samsung Electronics Secures Two Leadership Positions in 3GPP

    Source: Samsung

    ▲ (From left) Rajavelsamy Rajadurai and Lixiang Xu
     
    Samsung Electronics has secured new chair and vice-chair positions in the 3rd Generation Partnership Project (3GPP), the world’s largest telecommunications standards organization.
     
    Established in 1998, 3GPP develops global mobile communications standards with participation from major companies and organizations including Samsung, Qualcomm, Apple, Ericsson, Nokia and Huawei. The international body consists of three Technical Specification Groups (TSGs) — Service and System Aspects (SA), Radio Access Network (RAN) and Core Network and Terminals (CT) — each overseeing four to six Working Groups (WGs) for a total of 15 WGs across the organization.
     
    Rajavelsamy Rajadurai, Principal Architect at Samsung R&D Institute India-Bangalore (SRI–B), has been elected chair of 3GPP’s Service and System Aspects Working Group 3 (SA WG3). Meanwhile, Lixiang Xu, Principal Engineer at Samsung R&D Institute China-Beijing (SRC-B), has been elected vice chair of 3GPP’s Radio Access Network Working Group 3 (RAN WG3). SA WG3 defines standards related to network security and user privacy, whereas RAN WG3 develops base station interface protocol technologies. 
     
    In March, Dr. Younsun Kim, Master at Samsung Research, was elected chair of 3GPP’s Technical Specification Group Radio Access Network (TSG RAN) — leading standardization across all areas of wireless technology including the physical layer, protocol aspects and radio resource control.
     
    With these latest appointments, Samsung now holds three chair positions (SA WG2, SA WG3 and TSG RAN) and five vice-chair positions (SA WG4, SA WG6, RAN WG2, RAN WG3 and CT WG3) within 3GPP.
     
    Beginning in the second half of 2025, 3GPP will initiate research into 6G technologies. SA WG3 plans to explore security enhancements to counter cyberattacks, including those from quantum computers, and to develop privacy protection technologies for mobile communications networks. RAN WG3 is expected to research AI-powered solutions to reduce energy consumption at base stations and improve service quality. These groups are positioned to play a crucial role in advancing the use of AI, strengthening security and promoting sustainability — all key focus areas in the development of 6G.
     
    Through its expanded leadership within 3GPP, Samsung has established a framework to help drive standards across the mobile industry and collaborate with partners to shape the future of next-generation communications.

    MIL OSI Economics –

    May 27, 2025
  • MIL-OSI China: Xiaomi unveils self-developed 3-nanometer mobile chip

    Source: People’s Republic of China – State Council News

    Chinese tech firm Xiaomi officially released its first self-developed 3-nanometer mobile chip, Xring O1, in Beijing on Thursday evening.

    The chip features a 10-core CPU and a 16-core GPU to provide an improved user experience, Lei Jun, founder and chairman of Xiaomi, said at the launch event.

    Experts say the Xring O1 chip marks a major breakthrough in Xiaomi’s chip development and design capabilities.

    The chip has entered mass production and been integrated into the company’s latest flagship products — the Xiaomi 15S Pro smartphone and the Xiaomi Pad 7 Ultra tablet.

    Xiaomi’s research and development for the Xring O1 chip has spanned a decade. Since 2021, the company has invested more than 13 billion yuan (about 1.8 billion U.S. dollars) in the project, involving an R&D team of over 2,500 people.

    According to Lei, Xiaomi plans to invest 200 billion yuan in key-technology R&D over the next five years, including operating systems, artificial intelligence, and chips. 

    MIL OSI China News –

    May 27, 2025
  • MIL-OSI USA: Booker, Hirono Introduce the Real Education and Access for Healthy Youth Act

    US Senate News:

    Source: United States Senator for New Jersey Cory Booker

    WASHINGTON, D.C. — Today, U.S. Senators Cory Booker (D-NJ) and Mazie Hirono (D-HI) introduced the Real Education and Access for Healthy Youth Act (REAHYA), legislation to authorize federal grants for comprehensive sex education programs and youth sexual health services, and end funding for harmful Title V abstinence-only programs. U.S. Representatives Alma Adams (D-NC-12) and Pramila Jayapal (D-WA-07) will introduce companion legislation in the House. 

    Despite growing needs, young people across the country still lack access to comprehensive, evidence-based sex education and sexual health services. REAHYA aims to change that by creating federal grants that would fund programs at high schools, colleges, and organizations to support the sexual health and agency of students and young people. This legislation would also require program grantees to promote gender equity and offer instruction that is inclusive of young people with varying gender identities, gender expressions, and sexual orientations.

    “Young people need access to comprehensive sex education and sexual health services in order to make informed, responsible, and healthy decisions,” said Senator Booker. “Too many young adults are still receiving outdated and inaccurate information when it comes to making decisions about their sexual health, especially in underserved communities. This legislation aims to ensure sex education and sexual health programs are accessible and inclusive to everyone.” 

    “For too long, young people in our country have faced barriers to comprehensive, evidence-informed sex education and access to sexual health services, especially in underserved communities,” said Senator Hirono. “I am proud to reintroduce this legislation to help provide young people with the tools and knowledge they need to make informed decisions regarding their sexual health and to help them develop healthy relationships, while also promoting gender equity and offering education that is inclusive to people of all identities, expressions, and sexual orientations.”

    “For too long, our country’s sex education and sexual health resources have not met the needs of our young people, especially in underserved communities,” said Congresswoman Adams. “The Real Education and Access for Healthy Youth Act will arm our youth with the information and resources they need to make informed decisions on their bodies and their futures. Together we can work to reduce health disparities in our underserved communities and build a healthier future for generations to come.”

    “As the Trump administration continues to attack our reproductive rights and bodily autonomy and restricting access to scientifically accurate health information, this legislation is critical to protect and enhance young people’s access to comprehensive, culturally responsive, and equitable sex education,” said Congresswoman Jayapal. “REAHYA will equip young people with the necessary tools to make informed decisions about their relationships, sexual health, and overall well-being. This is an important step toward addressing disparities related to race, gender, and sexuality in current sex education programs, while also working to reduce rates of teen pregnancy and sexually transmitted infections.”

    Specifically, REAHYA would:

    1. Authorize funding for sex education programs at elementary and secondary schools, youth-serving organizations, and institutions of higher education;
    2. Ensure these programs are age-appropriate, medically accurate, and evidence-based;
    3. Provide grants for sex education teacher training;
    4. Establish grants for youth-serving organizations or health entities to deliver sexual health services for underserved youth; and
    5. Repeal the Title V Abstinence-Only-Until-Marriage Program.

    The Real Education and Access for Healthy Youth Act is endorsed by the following organizations: SiX Action, Equality California, Silver State Equality, American Humanist Association, Reproductive Health Access Project, AIDS United, National Council of Jewish Women, New Voices for Reproductive Justice, PWN-USA Ohio, Power to Decide, EducateUS, National Asian Pacific American Women’s Forum, Ipas US, Ibis Reproductive Health, NASTAD, SIECUS: Sex Ed for Social Change, Physicians for Reproductive Health, National Family Planning & Reproductive Health Association, Healthy Teen Network, Reproductive Freedom for All, The Arc of the United States, ACA Consumer Advocacy, National Partnership for Women & Families, ETR, National Network of Abortion Funds, Center for Biological Diversity, In Our Own Voice: National Black Women’s Reproductive Justice Agenda, Advocates for Youth, Guttmacher Institute, Vivent Health, National Latina Institute for Reproductive Justice, Planned Parenthood Federation of America, URGE: Unite for Reproductive & Gender Equity.

    The Real Education and Access for Healthy Youth Act is cosponsored by U.S. Senators Alex Padilla (D-CA), Ed Markey (D-MA), Jeff Merkley (D-OR), Richard Blumenthal (D-CT), and Elizabeth Warren (D-MA).

    To read the full text of the bill, click here. 

    MIL OSI USA News –

    May 27, 2025
  • MIL-OSI New Zealand: Parliament Hansard Report – Taxation (Budget Measures) Bill (No 2) — In Committee—Part 2 – 001483

    Source: Govt’s austerity Budget to cause real harm in communities

    Part 2 Amendments to other enactments

    CHAIRPERSON (Maureen Pugh): Members, we now come to Part 2. This is the debate on clauses 17 to 30, to the “Amendments to other enactments”. Part 2 contains changes to the KiwiSaver regime as well as changes to the Tax Administration Act 1994. The question is that Part 2 stand part.

    Rt Hon ADRIAN RURAWHE (Labour): Point of order. Thank you, Madam Chair. I refer to two matters. Before the closure motion and the vote on Part 1, the Chair seemed to indicate that despite the end of Part 1, that those elements of the KiwiSaver from Part 1 could be debated in Part 2. I just want to confirm that that’s the case, mainly because it is a bit odd given that we’ve voted on amendments to KiwiSaver clauses—but that’s what she indicated. There were very few calls on the KiwiSaver and I note that colleagues from the Green Party and Te Pāti Māori were seeking calls but were not given the opportunities to speak on that part of Part 1—

    CHAIRPERSON (Maureen Pugh): I understand.

    Rt Hon ADRIAN RURAWHE: So my question, just for clarity of the committee, is: have I heard that correctly?

    CHAIRPERSON (Maureen Pugh): You have heard that correctly, sir. And I was watching the debate and I heard the previous Chair make reference to being able to go back, where relevant, into clause 1 as it relates to KiwiSaver.

    Hon Dr DEBORAH RUSSELL (Labour): Speaking to the point of order. I just want to really, really clarify this because, with respect, the operative changes to the KiwiSaver regime actually occurred in Part 1. The Chair seemed to think that we could, in actual fact, discuss those operative changes in Part 2, but that’s going to be very hard because we can’t relate them to a clause in Part 2—they actually sit in Part 1. The amendments in Part 2 are very, very technical and just to do with a very small part of the changes. So may I suggest that provided we bring up new points, that we have a rather more thematic debate in Part 2 around KiwiSaver? We could confine it to KiwiSaver and always make sure we are bringing up a new idea rather than repeating ideas, rather than trying to relate specifically to clauses.

    Tim van de Molen: Speaking to the point of order.

    CHAIRPERSON (Maureen Pugh): I’ll just take some advice from the Clerk. Speaking to the point of order, Tim van de Molen.

    TIM VAN DE MOLEN (National—Waikato): Thank you, Madam Chair. There is, obviously, under Part 2, clause 17, which relates to KiwiSaver. My understanding of the comments from the Chair during the previous part were that KiwiSaver can, of course, be debated in Part 2 because there is a clause for that. But it would not be appropriate to give the committee the ability to rehash everything in clause 1 aspects of KiwiSaver because, of course, that’s been dealt with and voted on and completed under that part. So it should indeed be constrained to this part.

    CHAIRPERSON (Maureen Pugh): We’re all in agreement. I think everyone understands as it—and I did listen to the previous Chair and she has provided me with confirmation of her ruling. So I think you’re correct, Dr Russell, that we can refer back to clause 1 as it relates to the KiwiSaver. But I think we’ll just see how the substantive questions come through. To your point about the repetition, we will be very alert to that. Thank you.

    MIL OSI New Zealand News –

    May 27, 2025
  • MIL-Evening Report: Head knocks and ultra-violence: viral games Run It Straight and Power Slap put sports safety back centuries

    Source: The Conversation (Au and NZ) – By Christopher Yorke, Lecturer in sport management, Western Sydney University

    runitstraight24/instagram.com, The Conversation, CC BY

    Created in Australia, “Run It Straight” is a new, ultra-violent combat sport.

    Across a 20×4 metre grassed “battlefield,” players charge at full speed toward one another.

    Alternating between carrying the ball (ball runner) and defending (tackler), victory is awarded via knockout (a competitor cannot continue), or a judge’s decision based on an athlete’s dominance during the collisions.

    Despite neuroscientists issuing grave warnings about the brutal sport’s risks, Run It Straight’s viral popularity, including endorsement among high profile athletes, is accelerating.

    A growing scene

    This month, Melbourne hosted the inaugural “RUNIT Championship League” event.

    Footage showed some participants convulsing after their collisions as the winner celebrated, surrounded by children.

    Drawing hundreds of spectators and millions of online views, the full-speed collision challenge is already turning its violence and social media footprint into commercial success abroad, securing interest in the United States.

    The sport held some events in New Zealand this week, but one was was halted by Auckland Council due to safety concerns and failure to secure necessary permits.

    A history of sport and violence

    In ancient times, symbolic cultural displays of power and physical dominance featured in combat sports such as wrestling, boxing, pankration (a mixed martial art combining boxing and wrestling) and even armoured foot races.

    This brutal entertainment is reflected in contemporary collision sports such as the National Rugby League (NRL) and Australian Football League (AFL).

    In recent decades however, the danger of concussion has resulted in most contact sports changing rules and regulations to protect athletes from head injuries.

    Various measures have been implemented to mitigate, eliminate and treat head trauma.

    The Australian government is exerting influence and committing material resources to support athletes living with brain issues such as chronic traumatic encephalopathy (CTE).




    Read more:
    When does the love of the game outweigh the cost? ABC’s Plum brings rugby league’s concussion crisis to the fore


    Considering this multi-pronged effort to make contact sports safer, the violence of Run It Straight is jarring.

    Why are these new sports so popular?

    With its origins as a social media challenge, Run It Straight is perfect content for short-form social media platforms: an entire competition can be distilled into a 30-second highlight.

    Run It Straight’s accessible and minimalist format is also attractive to fans compared to many collision sports that have complex rules and strategies. This can be a barrier to interest, engagement and commercial returns.

    Run It Straight and other emerging, violent sports such as Power Slap (a fight sport where contestants slap each other so hard they can be knocked unconscious) are simplistic and brutal.

    But athletes in most traditional collision sports use their physical ability and skill to evade contact. Similarly, boxing is not just about strikes to the head, it is punch evasion, physical fitness and point scoring.

    But the visual spectacle and shock of two people running toward one another for an inevitable collision is a form of violence that appeals to an increasing number of sport fans.

    The risks involved

    Run It Straight is a new sport, and to our knowledge there is no empirical peer-reviewed research focusing on it.

    But many neurologists have expressed concerns about its total disregard for scientific evidence showing repeated head trauma damages brain health.

    With Run it Straight appearing to lack the medical resources and infrastructure of professional sports organisations, and with the competition’s expressed intent to have participants collide at high speed, the risk of significant injury is high.

    Power Slap, though, has been the subject of empirical research. A 2024 study reported many of the sport’s combatants showed visible signs of concussion (motor incoordination, slowness to get up and blank and vacant looks during bouts).

    An opportunity for ‘traditional’ sports?

    The rise of Run It Straight and Power Slap creates a unique opportunity for the governing bodies of contact codes such as AFL, NRL and rugby union to highlight what sets them apart.

    Key to this is athlete safety. For years, governing bodies in these codes have invested time and resources to implement concussion management protocols at professional and community levels.

    Currently, the tournament-based format for individual adult participants allows Run It Straight to operate without the broader governance responsibilities of football codes.

    However, it is because of those governance responsibilities that the football codes can amplify their athlete wellbeing credentials to reassure participants and parents who may be nervous about concussion risks.

    Second, the football codes are organised team sports played with multiple players on a team, facilitating skill acquisition, teamwork, mental wellbeing and physical fitness. While there appears to be a degree of camaraderie during Run It Straight events, it is evidently a one-on-one competition.

    Ultimately, the rise and evident popularity of Run It Straight and Power Slap provides a stark reminder there will always be a section of society that is drawn to high-risk behaviours.

    In turn, the football codes should look to highlight the value of balance and their athlete wellbeing credentials.

    The authors do not work for, consult, own shares in or receive funding from any company or organisation that would benefit from this article, and have disclosed no relevant affiliations beyond their academic appointment.

    – ref. Head knocks and ultra-violence: viral games Run It Straight and Power Slap put sports safety back centuries – https://theconversation.com/head-knocks-and-ultra-violence-viral-games-run-it-straight-and-power-slap-put-sports-safety-back-centuries-256473

    MIL OSI Analysis – EveningReport.nz –

    May 27, 2025
  • MIL-Evening Report: Why Donald Trump has put Asia on the precipice of a nuclear arms race

    Source: The Conversation (Au and NZ) – By Ian Langford, Executive Director, Security & Defence PLuS and Professor, UNSW Sydney

    For the past 75 years, America’s nuclear umbrella has been the keystone that has kept East Asia’s great‑power rivalries from turning atomic.

    President Donald Trump’s second‑term “strategic reset” now threatens to crack that arch.

    By pressuring allies to shoulder more of the defence burden, hinting that US forces might walk if the cheques do not clear and flirting with a return to nuclear testing, Washington is signalling that its once‑ironclad nuclear guarantee is, at best, negotiable.

    In Seoul, Tokyo and even Taipei, a once-unthinkable idea — building nuclear weapons — has begun to look disturbingly pragmatic.

    Nuclear umbrella starting to fray

    Extended deterrence is the promise the United States will use its own nuclear weapons, if necessary, to repel an attack on an ally.

    The logic is brutally simple: if North Korea contemplates a strike on South Korea, it must fear an American retaliatory strike, as well.

    The pledge allows allies to forgo their own bombs, curbing nuclear proliferation while reinforcing US influence.

    The idea dates to Dwight D. Eisenhower’s “New Look” military strategy, which relied on the threat of “massive retaliation” against the Soviet Union to defend Europe and Asia at a discount: fewer troops, more warheads.

    John F. Kennedy replaced that hair‑trigger doctrine with a “flexible response” defence strategy. This widened the spectrum of options to respond to potential Soviet attacks, but kept the nuclear backstop in place.

    By the 1990s, the umbrella seemed almost ornamental. Russia’s nuclear arsenal had rusted, China was keeping to a “minimal deterrent” strategy (maintaining a small stockpile of weapons), and US supremacy looked overwhelming.

    In 2020, then-President Barack Obama’s Nuclear Posture Review reaffirmed the umbrella guarantee, though Obama had voiced aspirations for the long‑term abolition of nuclear weapons.

    Barack Obama’s 2009 speech advocating nuclear disarmament in Prague.

    The Biden administration then embraced a new term – “integrated deterrence”, which fused cyber, space and economic tools with nuclear forces to deter potential foes.

    In recent years, however, North Korea’s sprint towards intercontinental ballistic missiles and the modernisation and expansion of China’s nuclear arsenal began testing the faith of US allies.

    Trump has now turbo‑charged those doubts. He has mused that his “strategic reset” ties protection to payment. If NATO’s Article 5 (which obliges members to come to each other’s defence) is “conditional” on US allies paying their fair share, why would Asia be different?

    Reports the White House has weighed a resumption of underground nuclear tests – and, under the Biden administration, even a more extensive arsenal – have rattled non‑proliferation diplomats.

    A Politico analysis bluntly warns that sustaining global “extended deterrence” in two parts of the world (Europe and Asia) may be beyond Trump’s patience — or pocketbook.

    A regional nuclear arms race

    Allies are taking note. Last month, an Institute for Strategic Studies survey found officials in Europe and Asia openly questioning whether an American president would risk San Francisco to save Seoul.

    In South Korea, public backing for a bomb now tops 70%.

    Japan’s ruling Liberal Democratic Party is, for the first time since 1945, considering a “nuclear sharing” arrangement with the US. Some former defence officials have even called for a debate on nuclear weapons themselves.

    Taiwan’s legislators — long muzzled on the subject — whisper about a “porcupine” deterrent based on asymmetrical warfare and a modest nuclear capability.

    If one domino tips, several could follow. A South Korean nuclear weapon program would almost certainly spur Japan to act. That, in turn, would harden China’s strategic outlook, inviting a regional arms race and shredding the fragile Nuclear Non‑Proliferation Treaty.

    The respected international relations journal Foreign Policy has already dubbed Trump’s approach “a nuclear Pandora’s box.”

    The danger is not just about more warheads, but also the shorter decision times to use them.

    Three or four nuclear actors crammed into the world’s busiest sea lanes — with hypersonic missiles and AI‑driven, early‑warning systems — create hair‑trigger instability. One misread radar blip over the East China Sea could end in catastrophe.

    What does this mean for Australia?

    Australia, too, has long relied on the US umbrella without demanding an explicit nuclear clause in the ANZUS treaty.

    The AUKUS submarine pact with the US and UK deepens technological knowledge sharing, but does not deliver an Australian bomb. Prime Minister Anthony Albanese insists the deal is about “deterrence, not offence,” yet the debate over funding nuclear-powered submarines exposes how tightly Australian strategy is lashed to American political will.

    A regional cascade of nuclear proliferation would confront Australia with agonising choices. Should it cling to the shrinking US umbrella, invest in a missile defence shield, or contemplate its own nuclear deterrent? Any such move towards its own weapon would collide with decades of proud non‑proliferation diplomacy and risk alienating Southeast Asian neighbours.

    More likely, Canberra will double down on alliance management — lobbying Washington to clarify its commitments, urging Seoul and Tokyo to stay the non‑nuclear course, and expanding regional defence exercises that make American resolve visible.

    In a neighbourhood bristling with new warheads, middle powers that remain non‑nuclear will need thicker conventional shields and sharper diplomatic tools.

    This means hardening Australia’s northern bases against a potential attack, accelerating its long‑range strike programs, and funding diplomatic initiatives that keep the Non-Proliferation Treaty alive.

    The Trump administration’s transactional posture risks broadcasting a deficit of will precisely when East Asian security hangs in the balance. If Washington allows confidence in extended deterrence to erode, history will not stand still; it will split the atom again, this time in Seoul, Tokyo or beyond.

    Australia has every incentive to prod its great power ally back toward strategic steadiness. The alternative is a region where the umbrellas proliferate — and, sooner or later, fail.

    Ian Langford is affiliated with the University of New South Wales.

    – ref. Why Donald Trump has put Asia on the precipice of a nuclear arms race – https://theconversation.com/why-donald-trump-has-put-asia-on-the-precipice-of-a-nuclear-arms-race-256577

    MIL OSI Analysis – EveningReport.nz –

    May 27, 2025
←Previous Page
1 … 256 257 258 259 260 … 735
Next Page→
NewzIntel.com

NewzIntel.com

MIL Open Source Intelligence

  • Blog
  • About
  • FAQs
  • Authors
  • Events
  • Shop
  • Patterns
  • Themes

Twenty Twenty-Five

Designed with WordPress